Sciweavers

10797 search results - page 2146 / 2160
» Robust control applications
Sort
View
128
Voted
PRL
2007
287views more  PRL 2007»
15 years 1 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
BPSC
2010
194views Business» more  BPSC 2010»
15 years 25 days ago
Ad-hoc Management Capabilities for Distributed Business Processes
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...
Sonja Zaplata, Dirk Bade, Kristof Hamann, Winfried...
CIKM
2010
Springer
15 years 14 days ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...
SIGOPS
2008
100views more  SIGOPS 2008»
15 years 10 days ago
Power management in the EPOS system
Power management strategies for embedded systems typically rely on static, application driven deactivation of components (e.g. sleep, suspend), or on dynamic voltage and frequency...
Geovani Ricardo Wiedenhoft, Lucas Francisco Wanner...
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
15 years 9 days ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
« Prev « First page 2146 / 2160 Last » Next »