Sciweavers

2863 search results - page 484 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
138
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
132
Voted
ISCA
2010
IEEE
222views Hardware» more  ISCA 2010»
15 years 4 months ago
Cohesion: a hybrid memory model for accelerators
Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to mana...
John H. Kelm, Daniel R. Johnson, William Tuohy, St...
138
Voted
WSCG
2004
242views more  WSCG 2004»
15 years 4 months ago
Hand Gesture Recognition for Human-Machine Interaction
Even after more than two decades of input devices development, many people still find the interaction with computers an uncomfortable experience. Efforts should be made to adapt c...
Elena Sánchez-Nielsen, Luis Antón-Ca...
119
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
LokVaani: demonstrating interactive voice in Lo3
In this work, we consider the goal of enabling effective voice communication in a TDMA, multi-hop mesh network, using low cost and low power platforms. We consider two primary usa...
Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu,...
156
Voted
RAID
2009
Springer
15 years 9 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...