Sciweavers

83 search results - page 12 / 17
» se 2010
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 3 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 5 months ago
The finite-dimensional Witsenhausen counterexample
Recently, a vector version of Witsenhausen's counterexample was considered and it was shown that in that limit of infinite vector length, certain quantization-based strategie...
Pulkit Grover, Se Yong Park, Anant Sahai
EUROGRAPHICS
2010
Eurographics
14 years 2 months ago
Rendering Wave Effects with Augmented Light Field
Ray–based representations can model complex light transport but are limited in modeling diffraction effects that require the simulation of wavefront propagation. This paper prov...
Se Baek Oh, Sriram Kashyap, Rohit Garg, Sharat Cha...
IUI
2010
ACM
14 years 2 months ago
A natural language interface of thorough coverage by concordance with knowledge bases
One of the critical problems in natural language interfaces is the discordance between the expressions covered by the interface and those by the knowledge base. In the graph-based...
Yong-Jin Han, Tae-Gil Noh, Seong-Bae Park, Se-Youn...
ISCA
2010
IEEE
232views Hardware» more  ISCA 2010»
13 years 10 months ago
Data marshaling for multi-core architectures
Previous research has shown that Staged Execution (SE), i.e., dividing a program into segments and executing each segment at the core that has the data and/or functionality to bes...
M. Aater Suleman, Onur Mutlu, José A. Joao,...