Sciweavers

9503 search results - page 1823 / 1901
» Authenticated System Calls
Sort
View
NPAR
2010
ACM
15 years 10 months ago
Vector fluid: a vector graphics depiction of surface flow
We present a simple technique for creating fluid silhouettes described with vector graphics, which we call ”Vector Fluid.” In our system, a solid region in the fluid is repr...
Ryoichi Ando, Reiji Tsuruno
AIPR
2002
IEEE
15 years 10 months ago
Hyperspectral Imaging of Kaposi's Sarcoma for Disease Assessment and Treatment Monitoring
Light spectroscopic methods are critical to advances in molecular characterization of disease processes. However, these methods have been limited to in-vitro or cell culture studi...
David Hattery, Moinuddin Hassan, Stavros Demos, Am...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 10 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...
163
Voted
IEEEPACT
2002
IEEE
15 years 10 months ago
Optimizing Loop Performance for Clustered VLIW Architectures
Modern embedded systems often require high degrees of instruction-level parallelism (ILP) within strict constraints on power consumption and chip cost. Unfortunately, a high-perfo...
Yi Qian, Steve Carr, Philip H. Sweany
INFOCOM
2002
IEEE
15 years 10 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das
« Prev « First page 1823 / 1901 Last » Next »