Sciweavers

6434 search results - page 1055 / 1287
» Model Transformations with Reference Models
Sort
View
FTDB
2007
95views more  FTDB 2007»
15 years 3 months ago
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industr...
Joseph M. Hellerstein, Michael Stonebraker, James ...
129
Voted
IJHPCA
2007
116views more  IJHPCA 2007»
15 years 3 months ago
Parallel Languages and Compilers: Perspective From the Titanium Experience
We describe the rationale behind the design of key features of Titanium—an explicitly parallel dialect of JavaTM for high-performance scientific programming—and our experienc...
Katherine A. Yelick, Paul N. Hilfinger, Susan L. G...
149
Voted
IJVR
2007
202views more  IJVR 2007»
15 years 3 months ago
Full Solid Angle Panoramic Viewing by Depth Image Warping on Field Programmable Gate Array
—To construct 3D virtual scenes from two-dimensional images with depth information, image warping techniques could be used. In this paper, a novel approach of cylindrical depth i...
Xiaoying Li, Baoquan Liu, Enhua Wu
117
Voted
TASLP
2008
99views more  TASLP 2008»
15 years 3 months ago
Epoch Extraction From Speech Signals
Epoch is the instant of significant excitation of the vocal-tract system during production of speech. For most voiced speech, the most significant excitation takes place around the...
K. S. R. Murty, B. Yegnanarayana
TISSEC
2008
202views more  TISSEC 2008»
15 years 3 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
« Prev « First page 1055 / 1287 Last » Next »