Sciweavers

6192 search results - page 1042 / 1239
» Distributed Control of Attention
Sort
View
PACS
2004
Springer
172views Hardware» more  PACS 2004»
15 years 9 months ago
Safe Overprovisioning: Using Power Limits to Increase Aggregate Throughput
Management of power in data centers is driven by the need to not exceed circuit capacity. The methods employed in the oversight of these power circuits are typically static and ad...
Mark E. Femal, Vincent W. Freeh
135
Voted
SEMWEB
2004
Springer
15 years 9 months ago
Learning Meta-descriptions of the FOAF Network
We argue that in a distributed context, such as the Semantic Web, ontology engineers and data creators often cannot control (or even imagine) the possible uses their data or ontolo...
Gunnar Aastrand Grimnes, Peter Edwards, Alun D. Pr...
SETN
2004
Springer
15 years 9 months ago
Computationally Intelligent Methods for Mining 3D Medical Images
We present novel intelligent tools for mining 3D medical images. We focus on detecting discriminative Regions of Interest (ROIs) and mining associations between their spatial distr...
Despina Kontos, Vasileios Megalooikonomou, Fillia ...
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 9 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ASAP
2003
IEEE
107views Hardware» more  ASAP 2003»
15 years 9 months ago
Energy Aware Register File Implementation through Instruction Predecode
The register file is a power-hungry device in modern architectures. Current research on compiler technology and computer architectures encourages the implementation of larger dev...
José L. Ayala, Marisa Luisa López-Va...
« Prev « First page 1042 / 1239 Last » Next »