Sciweavers

2388 search results - page 320 / 478
» Kernel information embeddings
Sort
View
128
Voted
IPPS
2005
IEEE
15 years 10 months ago
NUMA-Aware Java Heaps for Server Applications
We introduce a set of techniques to both measure and optimize memory access locality of Java applications running on cc-NUMA servers. These techniques work at the object level and...
Mustafa M. Tikir, Jeffrey K. Hollingsworth
SADFE
2005
IEEE
15 years 10 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
162
Voted
VISUALIZATION
2005
IEEE
15 years 10 months ago
Visualization of the Genus of Knots
The genus of a knot or link can be defined via Seifert surfaces. A Seifert surface of a knot or link is an oriented surface whose boundary coincides with that knot or link. Schem...
Jarke J. van Wijk, Arjeh M. Cohen
143
Voted
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 10 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
DAGM
2005
Springer
15 years 10 months ago
Multi-lingual and Multi-modal Speech Processing and Applications
Over the last decade voice technologies for telephony and embedded solutions became much more mature, resulting in applications providing mobile access to digital information from ...
Jozef Ivanecký, Julia Fischer, Marion Mast,...