Sciweavers

8655 search results - page 1289 / 1731
» Challenges for Trusted Computing
Sort
View
BIBM
2008
IEEE
110views Bioinformatics» more  BIBM 2008»
15 years 11 months ago
Genome Alignments Using MPI-LAGAN
We develop a parallel algorithm for a widely used whole genome alignment method called LAGAN. We use the MPI-based protocol to develop parallel solutions for two phases of the alg...
Ruinan Zhang, Huzefa Rangwala, George Karypis
CISS
2008
IEEE
15 years 11 months ago
On wireless network scheduling with intersession network coding
Abstract—Cross-layer optimization including congestion control, routing, and scheduling has shown dramatic throughput improvement over layered designs for wireless networks. In p...
Chih-Chun Wang, Ness B. Shroff
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 11 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
FGR
2008
IEEE
255views Biometrics» more  FGR 2008»
15 years 11 months ago
Aligned Cluster Analysis for temporal segmentation of human motion
Temporal segmentation of human motion into actions is a crucial step for understanding and building computational models of human motion. Several issues contribute to the challeng...
Feng Zhou, Fernando De la Torre, Jessica K. Hodgin...
FGR
2008
IEEE
152views Biometrics» more  FGR 2008»
15 years 11 months ago
Facial feature detection with optimal pixel reduction SVM
Automatic facial feature localization has been a longstanding challenge in the field of computer vision for several decades. This can be explained by the large variation a face i...
Minh Hoai Nguyen, Joan Perez, Fernando De la Torre
« Prev « First page 1289 / 1731 Last » Next »