Sciweavers

15088 search results - page 2906 / 3018
» Evaluation of NLP systems
Sort
View
ISWC
2006
IEEE
15 years 6 months ago
User Localization Using Wearable Electromagnetic Tracker and Orientation Sensor
This paper describes a localization method with wearable electromagnetic sensor and orientation sensor for wearable computer users. Many user localization methods have been invest...
Akihiro Hamaguchi, Masayuki Kanbara, Naokazu Yokoy...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 6 months ago
A Floorplan-Aware Dynamic Inductive Noise Controller for Reliable Processor Design
Power delivery is a growing reliability concern in microprocessors as the industry moves toward feature-rich, powerhungrier designs. To battle the ever-aggravating power consumpti...
Fayez Mohamood, Michael B. Healy, Sung Kyu Lim, Hs...
94
Voted
MICRO
2006
IEEE
135views Hardware» more  MICRO 2006»
15 years 6 months ago
Support for High-Frequency Streaming in CMPs
As the industry moves toward larger-scale chip multiprocessors, the need to parallelize applications grows. High inter-thread communication delays, exacerbated by over-stressed hi...
Ram Rangan, Neil Vachharajani, Adam Stoler, Guilhe...
86
Voted
QEST
2006
IEEE
15 years 6 months ago
Causality, Responsibility, and Blame: A Structural-Model Approach
This talk will provide an overview of work that I have done with Hana Chockler, Orna Kupferman, and Judea Pearl [1, 2, 10, 9] on defining notions such as causality, explanation, ...
Joseph Y. Halpern
97
Voted
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 6 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
« Prev « First page 2906 / 3018 Last » Next »