Sciweavers

451 search results - page 22 / 91
» Identifying Facts for TCBR
Sort
View
IPPS
2006
IEEE
15 years 3 months ago
Exploiting unbalanced thread scheduling for energy and performance on a CMP of SMT processors
This paper explores thread scheduling on an increasingly popular architecture: chip multiprocessors with simultaneous multithreading cores. Conventional multiprocessor scheduling,...
M. De Vuyst, Rakesh Kumar, Dean M. Tullsen
85
Voted
AVBPA
2005
Springer
288views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification
Abstract. Anti-spoofing protection of biometric systems is always a serious issue in real-life applications of an automatic personal verification system. Despite the fact that face...
Krzysztof Kryszczuk, Andrzej Drygajlo
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
15 years 3 months ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 3 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
SC
2004
ACM
15 years 3 months ago
Modernizing Existing Software: A Case Study
In this paper, we discuss one of our experiments using the coordination language MANIFOLD to restructure an existing sequential numerical application into a concurrent application...
C. T. H. Everaars, Farhad Arbab, Barry Koren