Sciweavers

6770 search results - page 1011 / 1354
» How GPUs Work
Sort
View
JCS
2011
87views more  JCS 2011»
14 years 11 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
PAMI
2011
14 years 11 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
226
Voted
PC
2011
318views Management» more  PC 2011»
14 years 11 months ago
High-performance message-passing over generic Ethernet hardware with Open-MX
In the last decade, cluster computing has become the most popular high-performance computing architecture. Although numerous technological innovations have been proposed to improv...
Brice Goglin
PUC
2011
14 years 11 months ago
Shape-changing interfaces
The design of physical interfaces has been constrained by the relative akinesis of the material world. Current advances in materials science promise to change this. In this paper, ...
Marcelo Coelho, Jamie Zigelbaum
TII
2011
206views Education» more  TII 2011»
14 years 11 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
« Prev « First page 1011 / 1354 Last » Next »