Sciweavers

1147 search results - page 58 / 230
» Transformation of Access Rights
Sort
View
ICS
2009
Tsinghua U.
14 years 3 months ago
Computer generation of fast fourier transforms for the cell broadband engine
The Cell BE is a multicore processor with eight vector accelerators (called SPEs) that implement explicit cache management through direct memory access engines. While the Cell has...
Srinivas Chellappa, Franz Franchetti, Markus P&uum...
MHCI
2004
Springer
14 years 2 months ago
Web Page Transformation When Switching Devices
With network and small screen device improvements, such as wireless abilities, increased memory and CPU speeds, users are no longer limited by location when accessing on-line infor...
Bonnie MacKay, Carolyn R. Watters, Jack Duffy
IPPS
1998
IEEE
14 years 29 days ago
Code Transformations for Low Power Caching in Embedded Multimedia Processors
In this paper, we present several novel strategies to improve software controlled cache utilization, so as to achieve lower power requirements for multi-media and signal processin...
Chidamber Kulkarni, Francky Catthoor, Hugo De Man
WCE
2007
13 years 10 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee
CHI
2011
ACM
13 years 9 days ago
The aligned rank transform for nonparametric factorial analyses using only anova procedures
Nonparametric data from multi-factor experiments arise often in human-computer interaction (HCI). Examples may include error counts, Likert responses, and preference tallies. But ...
Jacob O. Wobbrock, Leah Findlater, Darren Gergle, ...