Sciweavers

7512 search results - page 1464 / 1503
» Robust Computations with Dynamical Systems
Sort
View
110
Voted
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 5 months ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
15 years 5 months ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz
DSOM
2003
Springer
15 years 5 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
101
Voted
ICMI
2003
Springer
111views Biometrics» more  ICMI 2003»
15 years 5 months ago
Distributed and local sensing techniques for face-to-face collaboration
This paper describes techniques that allow users to collaborate on tablet computers that employ distributed sensing techniques to establish a privileged connection between devices...
Ken Hinckley
ISCA
2010
IEEE
305views Hardware» more  ISCA 2010»
15 years 5 months ago
Rethinking DRAM design and organization for energy-constrained multi-cores
DRAM vendors have traditionally optimized the cost-perbit metric, often making design decisions that incur energy penalties. A prime example is the overfetch feature in DRAM, wher...
Aniruddha N. Udipi, Naveen Muralimanohar, Niladris...
« Prev « First page 1464 / 1503 Last » Next »