Sciweavers

6862 search results - page 1201 / 1373
» Modeling Parallel Applications Performance on Heterogeneous ...
Sort
View
147
Voted
JOC
2010
92views more  JOC 2010»
14 years 10 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
170
Voted
HIPC
2003
Springer
15 years 8 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...
144
Voted
RTSS
2009
IEEE
15 years 10 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
115
Voted
IV
2005
IEEE
149views Visualization» more  IV 2005»
15 years 9 months ago
Visualisation Techniques for Users and Designers of Layout Algorithms
Visualisation systems consisting of a set of components through which data and interaction commands flow have been explored by a number of researchers. Such hybrid and multistage ...
Greg Ross, Alistair Morrison, Matthew Chalmers
ICASSP
2011
IEEE
14 years 7 months ago
Gammatone sub-band magnitude-domain dereverberation for ASR
We present an algorithm for dereverberation of speech signals for automatic speech recognition (ASR) applications. Often ASR systems are presented with speech that has been record...
Kshitiz Kumar, Rita Singh, Bhiksha Raj, Richard M....
« Prev « First page 1201 / 1373 Last » Next »