Sciweavers

8655 search results - page 1584 / 1731
» Challenges for Trusted Computing
Sort
View
128
Voted
CONEXT
2010
ACM
15 years 1 months ago
Optimal content placement for a large-scale VoD system
IPTV service providers offering Video-on-Demandcurrently use servers at each metropolitan office to store all the videos in their library. With the rapid increase in library sizes...
David Applegate, Aaron Archer, Vijay Gopalakrishna...
160
Voted
DAC
2010
ACM
15 years 1 months ago
Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation
Integrating a large number of on-chip voltage regulators holds the promise of solving many power delivery challenges through strong local load regulation and facilitates systemlev...
Zhiyu Zeng, Xiaoji Ye, Zhuo Feng, Peng Li
129
Voted
DLOG
2010
15 years 1 months ago
TBox Classification in Parallel: Design and First Evaluation
Abstract. One of the most frequently used inference services of description logic reasoners classifies all named classes of OWL ontologies into a subsumption hierarchy. Due to emer...
Mina Aslani, Volker Haarslev
130
Voted
EMSOFT
2010
Springer
15 years 1 months ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...
138
Voted
ICIP
2010
IEEE
15 years 1 months ago
Occlusion handling based on support and decision
This paper proposes a novel method for handling occluded pixels in stereo images based on a probabilistic voting framework that utilizes a novel support-and-decision process. Occl...
Dong Bo Min, Sehoon Yea, Anthony Vetro
« Prev « First page 1584 / 1731 Last » Next »