Sciweavers

2642 search results - page 462 / 529
» The development of Chez Scheme
Sort
View
68
Voted
IPPS
2008
IEEE
15 years 7 months ago
Introducing gravel: An MPI companion library
A non-trivial challenge in high performance, cluster computing is the communication overhead introduced by the cluster interconnect. A common strategy for addressing this challeng...
Anthony Danalis, Aaron Brown, Lori L. Pollock, D. ...
99
Voted
IROS
2008
IEEE
144views Robotics» more  IROS 2008»
15 years 7 months ago
Task maps in humanoid robot manipulation
— This paper presents an integrative approach to solve the coupled problem of reaching and grasping an object in a cluttered environment with a humanoid robot. While finding an ...
Michael Gienger, Marc Toussaint, Christian Goerick
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 7 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
100
Voted
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
15 years 7 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...
122
Voted
NDSS
2008
IEEE
15 years 7 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...