Sciweavers

5684 search results - page 241 / 1137
» Computing with active dendrites
Sort
View
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
16 years 1 months ago
Code Placement with Selective Cache Activity Minimization for Embedded Real-time Software Design
– Many embedded system designs usually impose (hard) read-time constraints on tasks. Thus, computing a tight upper bound of the worst case execution time (WCET) of a software is ...
Junhyung Um, Taewhan Kim
WOWMOM
2009
ACM
180views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
OPPORTUNITY: Towards opportunistic activity and context recognition systems
Opportunistic sensing allows to efficiently collect information about the physical world and the persons behaving in it. This may mainstream human context and activity recognitio...
Daniel Roggen, Kilian Förster, Alberto Calatr...
ISORC
2006
IEEE
15 years 10 months ago
JAAT: Java Alias Analysis Tool for Program Maintenance Activities
Alias analysis is a method for extracting sets of expressions which may possibly refer to the same memory locations during program execution. Although many researchers have alread...
Fumiaki Ohata, Katsuro Inoue
ICIP
2005
IEEE
15 years 10 months ago
An active volumetric model for 3D reconstruction
—In this paper, we present an active volumetric model (AVM) for 3D reconstruction from multiple calibrated images of a scene. The AVM is a physically motivated 3D deformable mode...
Xin Liu, Hongxun Yao, Xilin Chen, Wen Gao
ICPADS
2005
IEEE
15 years 10 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...