Sciweavers

184 search results - page 28 / 37
» Lipreading: A Graph Embedding Approach
Sort
View
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
15 years 1 months ago
Energy-efficient task allocation and scheduling for multi-mode MPSoCs under lifetime reliability constraint
In this paper, we consider energy minimization for multiprocessor system-on-a-chip (MPSoC) under lifetime reliability constraint of the system, which has become a serious concern ...
Lin Huang, Qiang Xu
ACSAC
2008
IEEE
15 years 4 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
VIS
2007
IEEE
117views Visualization» more  VIS 2007»
15 years 10 months ago
IStar: A Raster Representation for Scalable Image and Volume Data
Topology has been an important tool for analyzing scalar data and flow fields in visualization. In this work, we analyze the topology of multivariate image and volume data sets wit...
Joe Kniss, Warren Hunt, Kristin Potter, Pradeep...
DASFAA
2007
IEEE
199views Database» more  DASFAA 2007»
15 years 3 months ago
Detection and Visualization of Subspace Cluster Hierarchies
Subspace clustering (also called projected clustering) addresses the problem that different sets of attributes may be relevant for different clusters in high dimensional feature sp...
Elke Achtert, Christian Böhm, Hans-Peter Krie...
MICRO
2003
IEEE
95views Hardware» more  MICRO 2003»
15 years 2 months ago
Processor Acceleration Through Automated Instruction Set Customization
Application-specific extensions to the computational capabilities of a processor provide an efficient mechanism to meet the growing performance and power demands of embedded appl...
Nathan Clark, Hongtao Zhong, Scott A. Mahlke