Sciweavers

738 search results - page 130 / 148
» cases 2001
Sort
View
CCR
2006
76views more  CCR 2006»
13 years 9 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
TMI
2002
155views more  TMI 2002»
13 years 9 months ago
Active Shape Model Segmentation with Optimal Features
Abstract--An active shape model segmentation scheme is presented that is steered by optimal local features, contrary to normalized first order derivative profiles, as in the origin...
Bram van Ginneken, Alejandro F. Frangi, Joes Staal...
CASES
2001
ACM
14 years 1 months ago
A system-on-a-chip lock cache with task preemption support
Intertask/interprocess synchronization overheads may be significant in a multiprocessor-shared memory System-on-a-Chip implementation. These overheads are observed in terms of loc...
Bilge Saglam Akgul, Jaehwan Lee, Vincent John Moon...
CASES
2001
ACM
14 years 1 months ago
Transparent data-memory organizations for digital signal processors
Today's digital signal processors (DSPs), unlike general-purpose processors, use a non-uniform addressing model in which the primary components of the memory system--the DRAM...
Sadagopan Srinivasan, Vinodh Cuppu, Bruce L. Jacob
AUSFORENSICS
2004
13 years 11 months ago
Electronic Crime - its not only the big end of town that should be worried
The permeation of technology into our daily lives has resulted in new types of criminal activity and new ways of committing old crimes. As with traditional crime, fundamental to t...
Mathew Hannan, Barry Blundell