Sciweavers

8689 search results - page 1564 / 1738
» Software: hard data
Sort
View
IPPS
2008
IEEE
14 years 4 months ago
Design and optimization of a distributed, embedded speech recognition system
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
IPPS
2008
IEEE
14 years 4 months ago
Lattice Boltzmann simulation optimization on leading multicore platforms
We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of searchbased performance optimizatio...
Samuel Williams, Jonathan Carter, Leonid Oliker, J...
ISCC
2008
IEEE
105views Communications» more  ISCC 2008»
14 years 4 months ago
VoRaQue: Range queries on Voronoi overlays
—This paper presents VoRaQue, a software layer supporting range queries on Voronoi P2P overlays. VoRaQue maps data in a 2-dimensional space. The P2P overlay is defined by links ...
Michele Albano, Laura Ricci, Martina Baldanzi, Ran...
SBACPAD
2008
IEEE
127views Hardware» more  SBACPAD 2008»
14 years 4 months ago
Measuring Operating System Overhead on CMT Processors
Numerous studies have shown that Operating System (OS) noise is one of the reasons for significant performance degradation in clustered architectures. Although many studies exami...
Petar Radojkovic, Vladimir Cakarevic, Javier Verd&...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
« Prev « First page 1564 / 1738 Last » Next »