Sciweavers

5863 search results - page 1022 / 1173
» An evaluation of the TRIPS computer system
Sort
View
CCS
2004
ACM
15 years 7 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
HUC
2004
Springer
15 years 7 months ago
CAMP: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home
As the trend towards technology-enriched home environments progresses, the need to enable users to create applications to suit their own lives increases. While several recent proje...
Khai N. Truong, Elaine M. Huang, Gregory D. Abowd
168
Voted
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
15 years 7 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
101
Voted
SAMOS
2004
Springer
15 years 7 months ago
with Wide Functional Units
— Architectural resources and program recurrences are the main limitations to the amount of Instruction-Level Parallelism (ILP) exploitable from loops, the most time-consuming pa...
Miquel Pericàs, Eduard Ayguadé, Javi...
125
Voted
DFT
2003
IEEE
142views VLSI» more  DFT 2003»
15 years 7 months ago
Exploiting Instruction Redundancy for Transient Fault Tolerance
This paper presents an approach for integrating fault-tolerance techniques into microprocessors by utilizing instruction redundancy as well as time redundancy. Smaller and smaller...
Toshinori Sato
« Prev « First page 1022 / 1173 Last » Next »