Sciweavers

4770 search results - page 942 / 954
» Using System-on-a-Programmable-Chip Technology to Design Emb...
Sort
View
ISCA
2008
IEEE
132views Hardware» more  ISCA 2008»
15 years 6 months ago
Online Estimation of Architectural Vulnerability Factor for Soft Errors
As CMOS technology scales and more transistors are packed on to the same chip, soft error reliability has become an increasingly important design issue for processors. Prior resea...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
IEEEARES
2006
IEEE
15 years 5 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
ATAL
2005
Springer
15 years 5 months ago
Extending the recognition-primed decision model to support human-agent collaboration
There has been much research investigating team cognition, naturalistic decision making, and collaborative technology as it relates to real world, complex domains of practice. How...
Xiaocong Fan, Shuang Sun, Michael D. McNeese, John...
CIKM
2005
Springer
15 years 5 months ago
Person resolution in person search results: WebHawk
Finding information about people on the Web using a search engine is difficult because there is a many-to-many mapping between person names and specific persons (i.e. referents). ...
Xiaojun Wan, Jianfeng Gao, Mu Li, Binggong Ding
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 5 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...