Sciweavers

2216 search results - page 412 / 444
» Integration of Usability Techniques into the Software Develo...
Sort
View
ICCV
2001
IEEE
15 years 11 months ago
Robust Principal Component Analysis for Computer Vision
Principal Component Analysis (PCA) has been widely used for the representation of shape, appearance, and motion. One drawback of typical PCA methods is that they are least squares...
Fernando De la Torre, Michael J. Black
VLSID
2002
IEEE
123views VLSI» more  VLSID 2002»
15 years 10 months ago
Compiler-Directed Array Interleaving for Reducing Energy in Multi-Bank Memories
With the increased use of embedded/portable devices such as smart cellular phones, pagers, PDAs, hand-held computers, and CD players, improving energy efficiency is becoming a cri...
Victor Delaluz, Mahmut T. Kandemir, Narayanan Vija...
IPPS
2008
IEEE
15 years 4 months ago
Design and optimization of a distributed, embedded speech recognition system
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
IEEEARES
2006
IEEE
15 years 3 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
INFOCOM
2006
IEEE
15 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...