Sciweavers

10797 search results - page 2126 / 2160
» Robust control applications
Sort
View
CCGRID
2010
IEEE
13 years 10 months ago
FaReS: Fair Resource Scheduling for VMM-Bypass InfiniBand Devices
In order to address the high performance I/O needs of HPC and enterprise applications, modern interconnection fabrics, such as InfiniBand and more recently, 10GigE, rely on network...
Adit Ranadive, Ada Gavrilovska, Karsten Schwan
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
13 years 10 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
ICASSP
2010
IEEE
13 years 10 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
FSKD
2010
Springer
241views Fuzzy Logic» more  FSKD 2010»
13 years 10 months ago
FUZPAG: A fuzzy-controlled packet aggregation scheme for wireless mesh networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop backhaul networks in which mesh routers relay traffic on behalf of clients or other routers. Due to large MAC layer ov...
Peter Dely, Andreas Kassler, Nico Bayer, Hans Joac...
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
13 years 10 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
« Prev « First page 2126 / 2160 Last » Next »