Sciweavers

613 search results - page 43 / 123
» Matching Power
Sort
View
WOA
2010
14 years 9 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ASPLOS
2010
ACM
15 years 6 months ago
Conservation cores: reducing the energy of mature computations
Growing transistor counts, limited power budgets, and the breakdown of voltage scaling are currently conspiring to create a utilization wall that limits the fraction of a chip tha...
Ganesh Venkatesh, Jack Sampson, Nathan Goulding, S...
MM
2003
ACM
120views Multimedia» more  MM 2003»
15 years 5 months ago
Linking multimedia presentations with their symbolic source documents: algorithm and applications
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPointTM or AcrobatTM ) from which they were generated. T...
Berna Erol, Jonathan J. Hull, Dar-Shyang Lee
ISCA
2008
IEEE
105views Hardware» more  ISCA 2008»
15 years 6 months ago
Intra-disk Parallelism: An Idea Whose Time Has Come
Server storage systems use a large number of disks to achieve high performance, thereby consuming a significant amount of power. In this paper, we propose to significantly reduc...
Sriram Sankar, Sudhanva Gurumurthi, Mircea R. Stan
PE
2008
Springer
81views Optimization» more  PE 2008»
14 years 12 months ago
Using cross-system diversity in heterogeneous networks: Throughput optimization
This paper investigates the situation where a group of terminals can be simultaneously connected to several base stations using distinct technologies on nonoverlapping frequency b...
Samson Lasaulce, Alberto Suárez 0002, Raul ...