Sciweavers

1675 search results - page 84 / 335
» The Value of a Good Name
Sort
View
DATE
2007
IEEE
105views Hardware» more  DATE 2007»
14 years 3 months ago
Scratchpad memories vs locked caches in hard real-time systems: a quantitative comparison
We propose in this paper an algorithm for off-line selection of the contents of on-chip memories. The algorithm supports two types of on-chip memories, namely locked caches and sc...
Isabelle Puaut, Christophe Pais
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
We initiate a complexity-theoretic treatment of hardness amplification for collision-resistant hash functions, namely the transformation of weakly collision-resistant hash functio...
Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca T...
ICARIS
2007
Springer
14 years 3 months ago
A Novel Immune Inspired Approach to Fault Detection
This paper presents a novel immune inspired algorithm, named DERA (Dynamic Effector Regulatory Algorithm), aimed at fault detection and other anomaly detection problems. It integr...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....
ICMCS
2006
IEEE
243views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Comparison of Three 3-D Facial Reconstruction Approaches
We compare three Computer Vision approaches to 3-D reconstruction, namely passive Binocular Stereo and active Structured Lighting and Photometric Stereo, in application to human f...
Alexander Woodward, Da An, Georgy L. Gimel'farb, P...
SUTC
2006
IEEE
14 years 2 months ago
Self-organization Strategies for Dynamic Context Coverage in Capability-Constrained Mobile Sensor Networks
We propose and formally characterize a new problem named the dynamic context coverage problem in capabilityconstrained mobile sensor network environments. The goal is to move and ...
Shiow-yang Wu, Chao-Hong Liu, Chen-Kuang Tzeng