Sciweavers

820 search results - page 143 / 164
» Memory System Connectivity Exploration
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 2 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
IBMSJ
1998
81views more  IBMSJ 1998»
15 years 1 months ago
T Spaces
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Peter Wyckoff, Stephen W. McLaughry, Tobin J. Lehm...
CPAIOR
2010
Springer
14 years 12 months ago
Lazy Clause Generation: Combining the Power of SAT and CP (and MIP?) Solving
Finite domain propagation solving, the basis of constraint programming (CP) solvers, allows building very high-level models of problems, and using highly specific inference encapsu...
Peter J. Stuckey
CVPR
2012
IEEE
13 years 4 months ago
Parameterizing interpersonal behaviour with Laban movement analysis - A Bayesian approach
—In this paper we propose a probabilistic model to parameterize human interactive behaviour from human motion. To Support the model taxonomy, we use Laban Movement Analysis (LMA)...
Kamrad Khoshhal Roudposhti, Luís Santos, Ha...
DATE
2004
IEEE
152views Hardware» more  DATE 2004»
15 years 5 months ago
A Design Methodology for the Exploitation of High Level Communication Synthesis
In this paper we analyse some methodological concerns that have to be faced in a design flow which contains automatic synthesis phases from high-level, system descriptions. In par...
Francesco Bruschi, Massimo Bombana