Sciweavers

5799 search results - page 1083 / 1160
» Patterns Generate Architectures
Sort
View
85
Voted
IWMM
2007
Springer
110views Hardware» more  IWMM 2007»
15 years 6 months ago
Path: page access tracking to improve memory management
Traditionally, operating systems use a coarse approximation of memory accesses to implement memory management algorithms by monitoring page faults or scanning page table entries. ...
Reza Azimi, Livio Soares, Michael Stumm, Thomas Wa...
118
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 6 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
166
Voted
SSD
2007
Springer
243views Database» more  SSD 2007»
15 years 6 months ago
Continuous Medoid Queries over Moving Objects
In the k-medoid problem, given a dataset P, we are asked to choose k points in P as the medoids. The optimal medoid set minimizes the average Euclidean distance between the points ...
Stavros Papadopoulos, Dimitris Sacharidis, Kyriako...
CIBCB
2006
IEEE
15 years 6 months ago
A Novel Graphical Model Approach to Segmenting Cell Images
— Successful biological image analysis usually requires satisfactory segmentations to identify regions of interest as an intermediate step. Here we present a novel graphical mode...
Shann-Ching Chen, Ting Zhao, Geoffrey J. Gordon, R...
120
Voted
HAPTICS
2006
IEEE
15 years 6 months ago
Haptic Manipulation of Microspheres Using Optical Tweezers
Using optical tweezers (OT) and a haptic device, microspheres having diameters ranging from 3 to 4 ␮m (floating in a fluid solution) are manipulated in order to form patterns ...
Ibrahim Bukusoglu, Cagatay Basdogan, Alper Kiraz, ...
« Prev « First page 1083 / 1160 Last » Next »