Sciweavers

1831 search results - page 258 / 367
» Time Constraints in Workflow Systems
Sort
View
NAACL
1994
15 years 5 months ago
Session 10: Government Panel
The Workshop included an extended group of presentations by selected US government agencies and an invited guest from the European Community. These presentations, amplified in the...
Oscar N. Garcia
CASES
2006
ACM
15 years 9 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 4 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
ACCV
2007
Springer
15 years 10 months ago
An FPGA-Based Smart Camera for Gesture Recognition in HCI Applications
Smart camera is a camera that can not only see but also think and act. A smart camera is an embedded vision system which captures and processes image to extract application-specifi...
Yu Shi, Timothy Tsui
CASES
2007
ACM
15 years 7 months ago
A self-maintained memory module supporting DMM
The memory intensive nature of object-oriented languages such as C++ and Java has created the need of a high-performance dynamic memory management (DMM); however, it is a challeng...
Weixing Ji, Feng Shi, Baojun Qiao