Sciweavers

7512 search results - page 1464 / 1503
» Robust Computations with Dynamical Systems
Sort
View
139
Voted
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...
123
Voted
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
15 years 9 months ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz
136
Voted
DSOM
2003
Springer
15 years 9 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
130
Voted
ICMI
2003
Springer
111views Biometrics» more  ICMI 2003»
15 years 9 months ago
Distributed and local sensing techniques for face-to-face collaboration
This paper describes techniques that allow users to collaborate on tablet computers that employ distributed sensing techniques to establish a privileged connection between devices...
Ken Hinckley
ISCA
2010
IEEE
305views Hardware» more  ISCA 2010»
15 years 8 months ago
Rethinking DRAM design and organization for energy-constrained multi-cores
DRAM vendors have traditionally optimized the cost-perbit metric, often making design decisions that incur energy penalties. A prime example is the overfetch feature in DRAM, wher...
Aniruddha N. Udipi, Naveen Muralimanohar, Niladris...
« Prev « First page 1464 / 1503 Last » Next »