Sciweavers

6318 search results - page 1176 / 1264
» Data Leakage Detection
Sort
View
128
Voted
CGO
2008
IEEE
15 years 8 months ago
Automatic array inlining in java virtual machines
Array inlining expands the concepts of object inlining to arrays. Groups of objects and arrays that reference each other are placed consecutively in memory so that their relative ...
Christian Wimmer, Hanspeter Mössenböck
CISS
2008
IEEE
15 years 8 months ago
Sparsity in MRI RF excitation pulse design
—Magnetic resonance imaging (MRI) may be viewed as a two-stage experiment that yields a non-invasive spatial mapping of hydrogen nuclei in living subjects. Nuclear spins within a...
Adam C. Zelinski, Vivek K. Goyal, Elfar Adalsteins...
IPPS
2008
IEEE
15 years 8 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
126
Voted
IROS
2008
IEEE
148views Robotics» more  IROS 2008»
15 years 8 months ago
Identifying a moving object with an accelerometer in a camera view
— This paper proposes a method for identifying an object which contains an accelerometer out of many moving objects in the view of a stationary camera using motion data obtained ...
Osamu Shigeta, Shingo Kagami, Koichi Hashimoto
SECON
2008
IEEE
15 years 8 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
« Prev « First page 1176 / 1264 Last » Next »