Sciweavers

24529 search results - page 335 / 4906
» Computing on Authenticated Data
Sort
View
ISCAS
2005
IEEE
124views Hardware» more  ISCAS 2005»
15 years 9 months ago
Parallel FFT computation with a CDMA-based network-on-chip
— Fast Fourier transform (FFT) algorithms are used in a wide variety of digital signal processing applications and many of these require high-performance parallel implementations...
Daewook Kim, Manho Kim, Gerald E. Sobelman
SIGIR
2009
ACM
15 years 9 months ago
Page hunt: improving search engines using human computation games
There has been a lot of work on evaluating and improving the relevance of web search engines. In this paper, we suggest using human computation games to elicit data from players t...
Hao Ma, Raman Chandrasekar, Chris Quirk, Abhishek ...
ISWC
2000
IEEE
15 years 8 months ago
Finding Location Using Omnidirectional Video on a Wearable Computing Platform
In this paper we present a framework for a navigation system in an indoor environment using only omnidirectional video. Within a Bayesian framework we seek the appropriate place a...
Wasinee Rungsarityotin, Thad Starner
RTSS
1998
IEEE
15 years 8 months ago
The Time-Triggered Model of Computation
: The Time-Triggered (TT) model of computation is a model for the representation and analysis of the design of large hard real-time systems. Central to this model is the concept of...
Hermann Kopetz
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 8 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley