Sciweavers

8655 search results - page 281 / 1731
» Challenges for Trusted Computing
Sort
View
ICDAR
2009
IEEE
15 years 10 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke
IBPRIA
2007
Springer
15 years 9 months ago
Computer Vision Approaches to Pedestrian Detection: Visible Spectrum Survey
Pedestrian detection from images of the visible spectrum is a high relevant area of research given its potential impact in the design of pedestrian protection systems. There are ma...
David Gerónimo, Antonio M. López, An...
SBCCI
2003
ACM
135views VLSI» more  SBCCI 2003»
15 years 8 months ago
Modeling a Reconfigurable System for Computing the FFT in Place via Rewriting-Logic
The growing adoption of reconfigurable architectures opens new implementation alternatives and creates new design challenges. In the case of dynamically reconfigurable architectur...
Mauricio Ayala-Rincón, Rodrigo B. Nogueira,...
111
Voted
FM
2003
Springer
107views Formal Methods» more  FM 2003»
15 years 8 months ago
Verifying Emulation of Legacy Mission Computer Systems
Processor obsolescence is a serious maintenance problem for long-lived embedded control systems. A practical solution is to interpose an emulator program between the ‘legacy’ s...
Colin J. Fidge
133
Voted
EATIS
2008
ACM
15 years 5 months ago
Achieving better performance through true best effort in scavenging grid computing
In addition to an untuned performance, inefficient resource management in hinders any attempt to offer Quality of Service in scavenging grids. In this case, Best-Effort mechanisms...
Raphael de Aquino Gomes, Fábio Moreira Cost...