Sciweavers

8825 search results - page 1437 / 1765
» All for one or one for all
Sort
View
IEEEARES
2007
IEEE
15 years 7 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
INFOCOM
2007
IEEE
15 years 7 months ago
Load Balancing in Large-Scale RFID Systems
A radio frequency identifier (RFID) system consists of inexpensive, uniquely identifiable tags that are mounted on physical objects, and readers that track these tags (and hence...
Qunfeng Dong, Ashutosh Shukla, Vivek Shrivastava, ...
IPPS
2007
IEEE
15 years 7 months ago
File Creation Strategies in a Distributed Metadata File System
As computing breaches petascale limits both in processor performance and storage capacity, the only way that current and future gains in performance can be achieved is by increasi...
Ananth Devulapalli, Pete Wyckoff
ISBI
2007
IEEE
15 years 7 months ago
Automated Grading of Prostate Cancer Using Architectural and Textural Image Features
The current method of grading prostate cancer on histology uses the Gleason system, which describes five increasingly malignant stages of cancer according to qualitative analysis...
Scott Doyle, Mark Hwang, Kinsuk Shah, Anant Madabh...
ISCA
2007
IEEE
120views Hardware» more  ISCA 2007»
15 years 7 months ago
Examining ACE analysis reliability estimates using fault-injection
ACE analysis is a technique to provide an early reliability estimate for microprocessors. ACE analysis couples data from performance models with low level design details to identi...
Nicholas J. Wang, Aqeel Mahesri, Sanjay J. Patel
« Prev « First page 1437 / 1765 Last » Next »