Sciweavers

2346 search results - page 446 / 470
» Hierarchical State Machines
Sort
View
IPSN
2007
Springer
15 years 8 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
PREMI
2007
Springer
15 years 8 months ago
Self Adaptable Recognizer for Document Image Collections
Abstract. This paper presents an architecture that enables the recognizer to learn incrementally and, thereby adapt to document image collections for performance improvement. We ar...
Million Meshesha, C. V. Jawahar
139
Voted
ICMCS
2006
IEEE
215views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Biologically vs. Logic Inspired Encoding of Facial Actions and Emotions in Video
Automatic facial expression analysis is an important aspect of Human Machine Interaction as the face is an important communicative medium. We use our face to signal interest, disa...
Michel François Valstar, Maja Pantic
CASES
2006
ACM
15 years 7 months ago
Code transformation strategies for extensible embedded processors
Embedded application requirements, including high performance, low power consumption and fast time to market, are uncommon in the broader domain of general purpose applications. I...
Paolo Bonzini, Laura Pozzi
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
15 years 7 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood