Sciweavers

1181 search results - page 102 / 237
» UMTS MPSoC design evaluation using a system level design fra...
Sort
View
USENIX
2003
13 years 9 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 8 months ago
Modeling Aspect Mechanisms: A Top-Down Approach
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
Sergei Kojarski, David H. Lorenz
TCSV
2008
107views more  TCSV 2008»
13 years 8 months ago
Person Surveillance Using Visual and Infrared Imagery
This paper presents a methodology for analyzing multimodal and multiperspective systems for person surveillance. Using an experimental testbed consisting of two color and two infra...
Stephen J. Krotosky, Mohan M. Trivedi
EMSOFT
2005
Springer
14 years 1 months ago
Using de-optimization to re-optimize code
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution tim...
Stephen Hines, Prasad Kulkarni, David B. Whalley, ...
ICWS
2009
IEEE
14 years 5 months ago
Adaptive Prefetching Scheme Using Web Log Mining in Cluster-Based Web Systems
The main memory management has been a critical issue to provide high performance in web cluster systems. To overcome the speed gap between processors and disks, many prefetch sche...
Heung Ki Lee, Baik Song An, Eun Jung Kim