Sciweavers

2407 search results - page 67 / 482
» Design considerations for network processor operating system...
Sort
View
DAC
2001
ACM
16 years 4 months ago
Testing for Interconnect Crosstalk Defects Using On-Chip Embedded Processor Cores
Crosstalk effects degrade the integrity of signals traveling on long interconnects and must be addressed during manufacturing testing. External testing for crosstalk is expensive ...
Li Chen, Xiaoliang Bai, Sujit Dey
130
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
113
Voted
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 9 months ago
A Real-Time Lip SYNC System Using a Genetic Algorithm for Automatic Neural Network Configuration
In this paper we present a new method for mapping a natural speech to the lip shape animation in the real time. The speech signal, represented by MFCC vectors, is classified into ...
Goranka Zoric, Igor S. Pandzic
WWW
2005
ACM
16 years 4 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
232
Voted
VLDB
2007
ACM
145views Database» more  VLDB 2007»
16 years 3 months ago
Executing Stream Joins on the Cell Processor
Low-latency and high-throughput processing are key requirements of data stream management systems (DSMSs). Hence, multi-core processors that provide high aggregate processing capa...
Bugra Gedik, Philip S. Yu, Rajesh Bordawekar