Sciweavers

796 search results - page 110 / 160
» Spoofing prevention method
Sort
View
INFOCOM
2003
IEEE
14 years 3 months ago
Integrating effective-bandwidth-based QoS routing and best effort routing
—A methodology is presented for integrating effective-bandwidth-based routing for QoS-sensitive traffic and datagram routing of the best-effort traffic. To prevent excessive dela...
Stephen L. Spitler, Daniel C. Lee
IPPS
2003
IEEE
14 years 3 months ago
Improving Speculative Thread-Level Parallelism Through Module Run-Length Prediction
Exploiting speculative thread-level parallelism across modules, e.g., methods, procedures, or functions, have shown promise. However, misspeculations and task creation overhead ar...
Fredrik Warg, Per Stenström
ISCAS
2003
IEEE
92views Hardware» more  ISCAS 2003»
14 years 3 months ago
Motion adaptive de-interlacing by horizontal motion detection and enhanced ELA processing
A motion adaptive de-interlacing algorithm and its hardware architecture are presented in this paper. It consists the directional interpolation - ELA with median processing, and 4...
Shyh-Feng Lin, Yu-Lin Chang, Liang-Gee Chen
ISMAR
2003
IEEE
14 years 3 months ago
Evaluating Label Placement for Augmented Reality View Management
View management, a relatively new area of research in Augmented Reality (AR) applications, is about the spatial layout of 2D virtual annotations in the view plane. This paper repr...
Ronald Azuma, Chris Furmanski
DAC
2003
ACM
14 years 3 months ago
Performance trade-off analysis of analog circuits by normal-boundary intersection
We present a new technique to examine the trade-off regions of a circuit where its competing performances become “simultaneously optimal”, i.e. Pareto optimal. It is based on ...
Guido Stehr, Helmut E. Graeb, Kurt Antreich