Sciweavers

2421 search results - page 379 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
MICRO
2007
IEEE
79views Hardware» more  MICRO 2007»
15 years 10 months ago
Time Interpolation: So Many Metrics, So Few Registers
The performance of computer systems varies over the course of their execution. A system may perform well during some parts of its execution and poorly during others. To understand...
Todd Mytkowicz, Peter F. Sweeney, Matthias Hauswir...
CODES
2007
IEEE
15 years 10 months ago
Predator: a predictable SDRAM memory controller
Memory requirements of intellectual property components (IP) in contemporary multi-processor systems-on-chip are increasing. Large high-speed external memories, such as DDR2 SDRAM...
Benny Akesson, Kees Goossens, Markus Ringhofer
GIS
2005
ACM
16 years 5 months ago
Towards topological consistency and similarity of multiresolution geographical maps
Several application contexts require the ability to use together and compare different geographic datasets (maps) concerning the same or overlapping areas. This is for example the...
Alberto Belussi, Barbara Catania, Paola Podest&agr...
RAID
2010
Springer
15 years 2 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
CVPR
2006
IEEE
16 years 6 months ago
Inferring Facial Action Units with Causal Relations
A system that could automatically analyze the facial actions in real time have applications in a number of different fields. However, developing such a system is always a challeng...
Yan Tong, Wenhui Liao, Qiang Ji