Sciweavers

666 search results - page 110 / 134
» Design and implementation of a live-analysis digital forensi...
Sort
View
EGITALY
2006
14 years 11 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
ISCA
2008
IEEE
201views Hardware» more  ISCA 2008»
14 years 9 months ago
iDEAL: Inter-router Dual-Function Energy and Area-Efficient Links for Network-on-Chip (NoC) Architectures
Network-on-Chip (NoC) architectures have been adopted by a growing number of multi-core designs as a flexible and scalable solution to the increasing wire delay constraints in the...
Avinash Karanth Kodi, Ashwini Sarathy, Ahmed Louri
CGA
2004
14 years 9 months ago
Hyperscore: A Graphical Sketchpad for Novice Composers
graphical abstractions, Hyperscore provides a visual analogue for what is happening structurally in the music as opposed to displaying musical events in procedural notation or as a...
Morwaread M. Farbood, Egon C. Pasztor, Kevin Jenni...
MOBISYS
2009
ACM
15 years 10 months ago
Point&Connect: intention-based device pairing for mobile phone users
Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: wh...
Chunyi Peng, Guobin Shen, Yongguang Zhang, Songwu ...
SOSP
2003
ACM
15 years 6 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...