Results 71 to 80 of about 4,567,161 (224)

3D Small Object Detection Algorithm Based on Dynamic Feature Enhancement [PDF]

open access: yesJisuanji gongcheng
In 3D object detection from point clouds, the inherent sparsity of Light Detection And Ranging (LiDAR) data poses pronounced challenges for small objects.
LI Luyang, YAN Jinlong, FANG Zeru, JIN Qiqi, XUE Hongxin
doaj   +1 more source

RANDnet: Vehicle Re-Identification with Relation Attention and Nuance–Disparity Masks

open access: yesApplied Sciences
Vehicle re-identification (vehicle ReID) is designed to recognize all instances of a specific vehicle across various camera viewpoints, facing significant challenges such as high similarity among different vehicles from the same viewpoint and substantial
Yang Huang, Hao Sheng, Wei Ke
doaj   +1 more source

Deploying Virtual Machines on Shared Platforms [PDF]

open access: yes, 2011
In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms looking into a telecommunication cloud use case, which is also presented in this report. The architecture we present focuses on the security requirements
Aslam, Mudassar, Gehrmann, Christian
core   +1 more source

Holistic debugging - enabling instruction set simulation for software quality assurance [PDF]

open access: yes, 2006
We present holistic debugging, a novel method for observing execution of complex and distributed software. It builds on an instruction set simulator, which provides reproducible experiments and non-intrusive probing of state in a distributed system ...
Albertsson, Lars
core   +2 more sources

Virtual qubits, virtual temperatures, and the foundations of thermodynamics

open access: yes, 2011
We argue that thermal machines can be understood from the perspective of `virtual qubits' at `virtual temperatures': The relevant way to view the two heat baths which drive a thermal machine is as a composite system.
Brunner, Nicolas   +3 more
core   +1 more source

Hera-JVM: abstracting processor heterogeneity behind a virtual machine [PDF]

open access: yes, 2009
Heterogeneous multi-core processors, such as the Cell processor, can deliver exceptional performance, however, they are notoriously difficult to program effectively.
McIlroy, R., Sventek, J.
core   +1 more source

Motion and Virtual Cutting Simulation System for a Five-Axis Virtual Machine Tool

open access: yesInternational Journal of Automation and Smart Technology, 2011
Since five-axis machine tools are very costly and their use requires a high level of knowledge and expertise, a virtual machine tool must be used to simulate five-axis machine tool operation. Configuration code or a mechanism topology matrix must be used
Rong-Shean Lee, Ko-Jen Mei
doaj   +1 more source

Using reversible computing to achieve fail-safety [PDF]

open access: yes, 1997
This paper describes a fail-safe design approach that can be used to achieve a high level of fail-safety with conventional computing equipment which may contain design flaws.
Bishop, P. G.
core  

Rain VM: Portable Concurrency through Managing Code [PDF]

open access: yes, 2006
A long-running recent trend in computer programming is the growth in popularity of virtual machines. However, few have included good support for concurrency - a natural mechanism in the Rain programming language.
Brown, Neil
core  

Pre-virtualization: Soft layering for virtual machines

open access: yes2008 13th Asia-Pacific Computer Systems Architecture Conference, 2008
Despite its current popularity, para-virtualization has an enormous cost. Its deviation from the platform architecture abandons many of the benefits of traditional virtualization: stable and well-defined platform interfaces, hypervisor neutrality, operating system neutrality, and upgrade neutrality - in sum, modularity.
LeVasseur, Joshua   +6 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy