Sciweavers

7741 search results - page 1415 / 1549
» Security in Active Networks
Sort
View
142
Voted
ICPR
2006
IEEE
16 years 5 months ago
Event Recognition with Fragmented Object Tracks
Complete and accurate video tracking is very difficult to achieve in practice due to long occlusions, traffic clutter, shadows and appearance changes. In this paper, we study the ...
Anthony Hoogs, Gianfranco Doretto, John Schmiedere...
111
Voted
DAC
2009
ACM
16 years 5 months ago
NoC topology synthesis for supporting shutdown of voltage islands in SoCs
In many Systems on Chips (SoCs), the cores are clustered in to voltage islands. When cores in an island are unused, the entire island can be shutdown to reduce the leakage power c...
Ciprian Seiculescu, Srinivasan Murali, Luca Benini...
DAC
2008
ACM
16 years 5 months ago
Automatic package and board decoupling capacitor placement using genetic algorithms and M-FDM
In the design of complex power distribution networks (PDN) with multiple power islands, it is required that the PDN represents a low impedance as seen by the digital modules. This...
Krishna Bharath, Ege Engin, Madhavan Swaminathan
CHI
2009
ACM
16 years 5 months ago
Design influence on social play in distributed exertion games
Exertion games are an emerging form of interactive games that require players to invest significant physical effort as part of the gameplay, rather than just pressing buttons. The...
Florian Mueller, Martin R. Gibbs, Frank Vetere
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
16 years 5 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
« Prev « First page 1415 / 1549 Last » Next »