Sciweavers

687 search results - page 39 / 138
» Accessibility Transformation Gateway
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
IPMI
2003
Springer
15 years 10 months ago
Fusion of Autoradiographies with an MR Volume Using 2-D and 3-D Linear Transformations
The recent development of 3-D medical imaging devices has given access to the 3-D imaging of in vivo tissues, from an anatomical (MR, CT) or even functional point of view (fMRI, PE...
Eric Bardinet, Grégoire Malandain
ICS
2009
Tsinghua U.
15 years 4 months ago
Computer generation of fast fourier transforms for the cell broadband engine
The Cell BE is a multicore processor with eight vector accelerators (called SPEs) that implement explicit cache management through direct memory access engines. While the Cell has...
Srinivas Chellappa, Franz Franchetti, Markus P&uum...
IPPS
1998
IEEE
15 years 2 months ago
Code Transformations for Low Power Caching in Embedded Multimedia Processors
In this paper, we present several novel strategies to improve software controlled cache utilization, so as to achieve lower power requirements for multi-media and signal processin...
Chidamber Kulkarni, Francky Catthoor, Hugo De Man
WCE
2007
14 years 11 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee