Sciweavers

1795 search results - page 271 / 359
» Security Models and Information Flow
Sort
View
FCCM
2011
IEEE
241views VLSI» more  FCCM 2011»
13 years 23 days ago
Multilevel Granularity Parallelism Synthesis on FPGAs
— Recent progress in High-Level Synthesis (HLS) es has helped raise the abstraction level of FPGA programming. However implementation and performance evaluation of the HLS-genera...
Alexandros Papakonstantinou, Yun Liang, John A. St...
ICIP
2004
IEEE
14 years 10 months ago
A motion field reconstruction scheme for smooth boundary video object segmentation
Motion segmentation is a classic and on-going research topic which is an important pre-stage for many video processes. The reliability of the motion field calculation directly dete...
Jean Gao, Ninad Thakoor, Sungyong Jung
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
CHI
2006
ACM
14 years 9 months ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
HICSS
2005
IEEE
77views Biometrics» more  HICSS 2005»
14 years 2 months ago
Towards a Theory of Value Latency for IT Investments
Multiple studies in the information systems (IS) literature recognize that information technology (IT) investments may not yield immediate returns. Nevertheless, there has been a ...
Kim Huat Goh, Robert J. Kauffman