Sciweavers

9719 search results - page 1674 / 1944
» Inference for Multiplicative Models
Sort
View
CCS
2009
ACM
15 years 11 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
DAWAK
2009
Springer
15 years 11 months ago
Dynamic Clustering-Based Estimation of Missing Values in Mixed Type Data
The appropriate choice of a method for imputation of missing data becomes especially important when the fraction of missing values is large and the data are of mixed type. The prop...
Vadim V. Ayuyev, Joseph Jupin, Philip W. Harris, Z...
HIPEAC
2009
Springer
15 years 11 months ago
Predictive Runtime Code Scheduling for Heterogeneous Architectures
Heterogeneous architectures are currently widespread. With the advent of easy-to-program general purpose GPUs, virtually every recent desktop computer is a heterogeneous system. Co...
Víctor J. Jiménez, Lluís Vila...
CODES
2009
IEEE
15 years 11 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
CRV
2009
IEEE
217views Robotics» more  CRV 2009»
15 years 11 months ago
Probabilistic 3D Tracking: Rollator Users' Leg Pose from Coronal Images
Understanding the human gait is an important objective towards improving elderly mobility. In turn, gait analyses largely depend on kinematic and dynamic measurements. While the m...
Samantha Ng, Adel H. Fakih, Adam Fourney, Pascal P...
« Prev « First page 1674 / 1944 Last » Next »