Sciweavers

42738 search results - page 8267 / 8548
» Search Computing Systems
Sort
View
138
Voted
IPPS
2008
IEEE
15 years 10 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
210
Voted
LCN
2008
IEEE
15 years 10 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
169
Voted
NOCS
2008
IEEE
15 years 10 months ago
Network Simplicity for Latency Insensitive Cores
In this paper we examine a latency insensitive network composed of very fast and simple circuits that connects SoC cores that are also latency insensitive, de-synchronized, or asy...
Daniel Gebhardt, JunBok You, W. Scott Lee, Kenneth...
132
Voted
RTAS
2008
IEEE
15 years 10 months ago
A Hybrid DVS Scheme for Interactive 3D Games
Interactive 3D games are now widely available on a variety of mobile devices for which battery-life is a major concern. Many of these devices support voltage/frequencyscalable pro...
Yan Gu, Samarjit Chakraborty
154
Voted
SIBGRAPI
2008
IEEE
15 years 10 months ago
PCA-Based 3D Face Photography
This paper presents a 3D face photography system based on a small set of training facial range images. The training set is composed by 2D texture and 3D range images (i.e. geometr...
Jesus P. Mena-Chalco, Ives Macedo, Luiz Velho, Rob...
« Prev « First page 8267 / 8548 Last » Next »