Sciweavers

8655 search results - page 1495 / 1731
» Challenges for Trusted Computing
Sort
View
CGF
2011
14 years 2 months ago
Prior Knowledge for Part Correspondence
Classical approaches to shape correspondence base their computation purely on the properties, in particular geometric similarity, of the shapes in question. Their performance stil...
Oliver van Kaick, Andrea Tagliasacchi, Oana Sidi, ...
HRI
2011
ACM
14 years 2 months ago
Learning to interpret pointing gestures with a time-of-flight camera
Pointing gestures are a common and intuitive way to draw somebody’s attention to a certain object. While humans can easily interpret robot gestures, the perception of human beha...
David Droeschel, Jörg Stückler, Sven Beh...
NOSSDAV
2011
Springer
14 years 1 months ago
A measurement study of resource utilization in internet mobile streaming
The pervasive usage of mobile devices and wireless networking support have enabled more and more Internet streaming services to all kinds of heterogeneous mobile devices. However,...
Yao Liu, Fei Li, Lei Guo, Songqing Chen
PODC
2011
ACM
14 years 1 months ago
Robust network supercomputing without centralized control
Internet supercomputing is becoming an increasingly popular means for harnessing the power of a vast number of interconnected computers. This comes at a cost substantially lower t...
Seda Davtyan, Kishori M. Konwar, Alexander A. Shva...
PROCEDIA
2011
14 years 1 months ago
10x10: A General-purpose Architectural Approach to Heterogeneity and Energy Efficiency
Two decades of microprocessor architecture driven by quantitative 90/10 optimization has delivered an extraordinary 1000-fold improvement in microprocessor performance, enabled by...
Andrew A. Chien, Allan Snavely, Mark Gahagan
« Prev « First page 1495 / 1731 Last » Next »