Sciweavers

12493 search results - page 2231 / 2499
» Information Access in the Web
Sort
View
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
15 years 8 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
15 years 8 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...
PERCOM
2006
ACM
15 years 8 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...
ASPLOS
2006
ACM
15 years 8 months ago
Stealth prefetching
Prefetching in shared-memory multiprocessor systems is an increasingly difficult problem. As system designs grow to incorporate larger numbers of faster processors, memory latency...
Jason F. Cantin, Mikko H. Lipasti, James E. Smith
ASSETS
2006
ACM
15 years 8 months ago
Designing a scripting language to help the blind program visually
The vast proliferation of GUI-based applications, including graphical interactive development environments (IDEs), has placed blind programmers at a severe disadvantage in a profe...
Kenneth G. Franqueiro, Robert M. Siegfried
« Prev « First page 2231 / 2499 Last » Next »