Sciweavers

287 search results - page 4 / 58
» As We May Read: The Reading Appliance Revolution
Sort
View
USENIX
2008
14 years 12 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
MJ
2006
76views more  MJ 2006»
14 years 9 months ago
Reading the footprints of strained islands
We report on recent advances in the understanding of surface processes occurring during growth and post-growth annealing of strained islands which may find application as self-ass...
A. Rastelli, Mathieu Stoffel, G. Katsaros, J. Ters...
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
14 years 9 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
ICCHP
2010
Springer
15 years 2 months ago
A Mobile Phone Application Enabling Visually Impaired Users to Find and Read Product Barcodes
Abstract. While there are many barcode readers available for identifying products in a supermarket or at home on mobile phones (e.g., Red Laser iPhone app), such readers are inacce...
Ender Tekin, James M. Coughlan
DATE
2000
IEEE
88views Hardware» more  DATE 2000»
15 years 2 months ago
Techniques for Reducing Read Latency of Core Bus Wrappers
Today’s system-on-a-chip designs consist of many cores. To enable cores to be easily integrated into different systems, many propose creating cores with their internal logic sep...
Roman L. Lysecky, Frank Vahid, Tony Givargis