Sciweavers

2956 search results - page 326 / 592
» Targeted Data Prefetching
Sort
View
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 10 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
CLEANDB
2006
ACM
145views Database» more  CLEANDB 2006»
15 years 10 months ago
Cleansing Databases of Misspelled Proper Nouns
The paper presents a data cleansing technique for string databases. We propose and evaluate an algorithm that identifies a group of strings that consists of (multiple) occurrence...
Arturas Mazeika, Michael H. Böhlen
ETRA
2006
ACM
128views Biometrics» more  ETRA 2006»
15 years 10 months ago
An eye tracking interface for image search
This paper explores the feasibility of using an eye tracker as an image retrieval interface. A database of image similarity values between 1000 Corel images is used in the study. ...
Oyewole Oyekoya, Fred Stentiford
ACSC
2005
IEEE
15 years 9 months ago
Simulating Network Robustness for Critical Infrastructure Networks
We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Anthony H. Dekker
AVSS
2005
IEEE
15 years 9 months ago
A modular multi-camera framework for team sports tracking
This article presents a modular architecture for multicamera tracking in the context of sports broadcasting. For each video stream, a geometrical module continuously performs the ...
Jean-Bernard Hayet, Tom Mathes, Jacek Czyz, Justus...