Sciweavers

1242 search results - page 221 / 249
» Digital Objects as Passwords
Sort
View
CGO
2008
IEEE
15 years 4 months ago
Cole: compiler optimization level exploration
Modern compilers implement a large number of optimizations which all interact in complex ways, and which all have a different impact on code quality, compilation time, code size,...
Kenneth Hoste, Lieven Eeckhout
AIPR
2007
IEEE
15 years 4 months ago
3D Scene Reconstruction through a Fusion of Passive Video and Lidar Imagery
Geometric structure of a scene can be reconstructed using many methods. In recent years, two prominent approaches have been digital photogrammetric analysis using passive stereo i...
Prudhvi Gurram, Stephen Lach, Eli Saber, Harvey E....
81
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 4 months ago
Study of Best-Effort VoIP Handovers between WLAN and EVDO Networks
The IEEE 802.11 based Wireless LANs (WLANs) have emerged as a viable technology for supporting real-time applications such as Voice over IP (VoIP). Even the Personal Digital Assist...
Amit P. Jardosh, Rajeev Koodli, Tat Chan
ICCCN
2007
IEEE
15 years 4 months ago
Design Techniques for Streamlined Integration and Fault Tolerance in a Distributed Sensor System for Line-crossing Recognition
Abstract — Distributed sensor system applications (e.g., wireless sensor networks) have been studied extensively in recent years. Such applications involve resource-limited embed...
Chung-Ching Shen, Roni Kupershtok, Shuvra S. Bhatt...
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
15 years 4 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith