Sciweavers

1225 search results - page 166 / 245
» The Instance Complexity Conjecture
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 3 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
ACSC
2008
IEEE
14 years 3 months ago
A model, schema, and interface for metadata file systems
Modern computer systems are based on the traditional hierarchical file system model, but typically contain large numbers of files with complex interrelationships. This tradition...
Stijn Dekeyser, Richard Watson, Lasse Motrø...
AVSS
2008
IEEE
14 years 3 months ago
Person Tracking with Audio-Visual Cues Using the Iterative Decoding Framework
Tracking humans in an indoor environment is an essential part of surveillance systems. Vision based and microphone array based trackers have been extensively researched in the pas...
Shankar T. Shivappa, Mohan M. Trivedi, Bhaskar D. ...
CDC
2008
IEEE
138views Control Systems» more  CDC 2008»
14 years 3 months ago
Predictive compensation for communication outages in networked control systems
— A predictive outage compensator co-located with the actuator node in a networked control system can be used to counteract unpredictable losses of data in the feedback control l...
Erik Henriksson, Henrik Sandberg, Karl Henrik Joha...
DATE
2008
IEEE
75views Hardware» more  DATE 2008»
14 years 3 months ago
Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization
With technology advances, the number of cores integrated on a chip and their speed of operation is increasing. This, in turn is leading to a significant increase in chip temperat...
Srinivasan Murali, Almir Mutapcic, David Atienza, ...