Sciweavers

5866 search results - page 1074 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
CCS
2008
ACM
15 years 5 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
AND
2010
15 years 1 months ago
Reshaping automatic speech transcripts for robust high-level spoken document analysis
High-level spoken document analysis is required in many applications seeking access to the semantic content of audio data, such as information retrieval, machine translation or au...
Julien Fayolle, Fabienne Moreau, Christian Raymond...
EUROSYS
2008
ACM
16 years 4 days ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
CVPR
2004
IEEE
16 years 5 months ago
Detection and Removal of Rain from Videos
The visual effects of rain are complex. Rain consists of spatially distributed drops falling at high velocities. Each drop refracts and reflects the environment, producing sharp i...
Kshitiz Garg, Shree K. Nayar
VLSID
2001
IEEE
144views VLSI» more  VLSID 2001»
16 years 3 months ago
Next Generation Network Processors
Networking hardware manufacturers face the dual demands of supporting ever increasing bandwidth requirements, while also delivering new features, such as the ability to implement ...
Deepak Kataria
« Prev « First page 1074 / 1174 Last » Next »