Sciweavers

8655 search results - page 1561 / 1731
» Challenges for Trusted Computing
Sort
View
LCTRTS
2000
Springer
15 years 2 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross
SC
1995
ACM
15 years 1 months ago
Parallelizing the Phylogeny Problem
The problem of determining the evolutionary history of species in the form of phylogenetic trees is known as the phylogeny problem. We present a parallelization of the character c...
Jeff A. Jones, Katherine A. Yelick
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
15 years 1 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
HUC
2009
Springer
15 years 1 months ago
Validated caloric expenditure estimation using a single body-worn sensor
In 2007, approximately 30% of US adults were obese, with related health care costs exceeding 100 billion dollars. Clearly, the obesity epidemic represents a growing societal conce...
Jonathan Lester, Carl Hartung, Laura Pina, Ryan Li...
MOBISYS
2010
ACM
15 years 23 days ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
« Prev « First page 1561 / 1731 Last » Next »