Sciweavers

1243 search results - page 222 / 249
» More efficient predictive control
Sort
View
CHI
2007
ACM
16 years 3 months ago
Software or wetware?: discovering when and why people use digital prosthetic memory
Our lives are full of memorable and important moments, as well as important items of information. The last few years have seen the proliferation of digital devices intended to sup...
Steve Whittaker, Vaiva Kalnikaité
131
Voted
ICCAD
2006
IEEE
131views Hardware» more  ICCAD 2006»
16 years 12 days ago
High-level synthesis challenges and solutions for a dynamically reconfigurable processor
A dynamically reconfigurable processor (DRP) is designed to achieve high area efficiency by switching reconfigurable data paths dynamically. Our DRP architecture has a stand alone...
Takao Toi, Noritsugu Nakamura, Yoshinosuke Kato, T...
109
Voted
SOUPS
2010
ACM
15 years 7 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
GECCO
2007
Springer
258views Optimization» more  GECCO 2007»
15 years 7 months ago
TFBS identification by position- and consensus-led genetic algorithm with local filtering
Identification of Transcription Factor Binding Site (TFBS) motifs in multiple DNA upstream sequences is important in understanding the mechanism of gene regulation. This identific...
Tak-Ming Chan, Kwong-Sak Leung, Kin-Hong Lee
129
Voted
USENIX
2008
15 years 5 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox