Sciweavers

5470 search results - page 111 / 1094
» Distributed Control Lab
Sort
View
104
Voted
EUC
2007
Springer
15 years 9 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ISLPED
2005
ACM
123views Hardware» more  ISLPED 2005»
15 years 8 months ago
Coordinated, distributed, formal energy management of chip multiprocessors
Designers are moving toward chip-multiprocessors (CMPs) to leverage application parallelism for higher performance while keeping design complexity under control. However, to date,...
Philo Juang, Qiang Wu, Li-Shiuan Peh, Margaret Mar...
129
Voted
COMPSAC
2006
IEEE
15 years 6 months ago
Distributed Processes on Tree Hash
We propose Tree Hash to reduce bucket overflow, which is one of the inherent problems in dynamic hash techniques. In this investigation, we dicuss how to improve efficien cy of Tre...
Kyosuke Yasuda, Takao Miura, Isamu Shioya
164
Voted
ICIP
2009
IEEE
16 years 3 months ago
Pfid: Pittsburgh Fast-food Image Dataset
We introduce the first visual dataset of fast foods with a total of 4,545 still images, 606 stereo pairs, 303 3600 videos for structure from motion, and 27 privacy-preserving vide...
80
Voted
CHI
2005
ACM
16 years 3 months ago
Evaluating paper prototypes on the street
The evaluation of paper prototypes is normally conducted in controlled settings such as a usability lab. This paper, in contrast, reports on a study where evaluations of a paper p...
David G. Hendry, Sara Mackenzie, Ann Kurth, Freya ...