Showing 1 - 20 results of 55 for search '"STORED"', query time: 0.07s Refine Results
  1. 1

    Virtual archival exhibition system : an authoring tool for developing web-based virtual exhibitions by Ruan, Yang, Chennupati, K. Ramaiah, Foo, Schubert

    Published 2010
    “…Based on an XML-based metadata database, VAES provides tools for users to create, update, extract, and search metadata of artifacts and exhibitions stored in the database. The actual digital artifacts (information objects) are reused by referencing as necessary without duplicating the artifacts. …”
    Get full text
    Get full text
    Get full text
    Conference Paper
  2. 2

    Self-repairing codes for distributed storage : a projective geometric construction by Oggier, Frederique, Datta, Anwitaman

    Published 2011
    “…Self-Repairing Codes (SRC) are codes designed to suit the need of coding for distributed networked storage: they not only allow stored data to be recovered even in the presence of node failures, they also provide a repair mechanism where as little as two live nodes can be contacted to regenerate the data of a failed node. …”
    Get full text
    Get full text
    Conference Paper
  3. 3

    White light interferometer with color CCD for 3D-surface profiling of microsystems by Upputuri, Paul Kumar, Pramanik, Manojit, Nandigana, Krishna Mohan, Kothiyal, Mahendra Prasad

    Published 2015
    “…The red-bluegreen (RGB) color interferogram stored in a computer is then decomposed into its individual components and corresponding phase maps for red, green, and blue components are calculated independently. …”
    Get full text
    Get full text
    Conference Paper
  4. 4

    Optimized integration of hydrogen technologies in island energy systems by Nastasi, Benedetto, Mazzoni, Stefano, Groppi, Daniele, Garcia, Davide Astiaso, Romagnoli, Alessandro

    Published 2021
    “…Furthermore, when coupled with CO2 emissions the performance vary with the final use of the stored hydrogen.…”
    Get full text
    Conference Paper
  5. 5

    Historical data is useful for navigation planning : data driven route generation for autonomous ship by Tan, Wei Chian, Weng, Ching-Yen, Zhou, Yu, Chua, Kie Hian, Chen, I-Ming

    Published 2021
    “…Before starting service, existing AIS records in the form of ship properties and corresponding route are preprocessed and stored in the form of Ship and Navigation Feature. …”
    Get full text
    Conference Paper
  6. 6

    Unified Storage File Format for Additive Manufacturing by Roller, Dieter, Baumann, Felix, Eichhoff, Julian

    Published 2016
    “…This work investigates what different types of information are created throughout the AM PDP, how it can be stored and retrieved efficiently, and how the format can be defined to be extensible for future use cases. …”
    Get full text
    Get full text
    Conference Paper
  7. 7

    MetroBuzz : interactive 3D visualization of spatiotemporal data by Zeng, Wei, Zhong, Chen, Anwar, Afian, Arisona, Stefan Müller, McLoughlin, Ian Vince

    Published 2013
    “…These 3D elements are stored in a spatial index that allows quick retrieval of relevant data. …”
    Get full text
    Get full text
    Conference Paper
  8. 8

    Collaborative analytics for predicting expressway-traffic congestion by Chong, Chee Seng, Zoebir, Bon, Tan, Alan Yu Shyang, Tjhi, William-Chandra, Zhang, Tianyou, Lee, Kee Khoon, Li, Reuben Mingguang, Tung, Whye Loon, Lee, Francis Bu-Sung

    Published 2013
    “…We designed a recommendation engine for the system to enable matching of analytics needs with relevant workflows stored in repository. The engine relies on meta-predictive modeling of traffic-analysis workflow-characteristics. …”
    Get full text
    Get full text
    Conference Paper
  9. 9

    Meta-Cognitive Neuro-Fuzzy Inference System for human emotion recognition by Suresh, Sundaram, Subramanian, K., Venkatesh Babu, R.

    Published 2013
    “…McFIS decides on what-to-learn, when-to-learn and how-to-learn based on the knowledge stored in the classifier and the information contained in the new training samples. …”
    Get full text
    Get full text
    Conference Paper
  10. 10

    Generation of 3D building models from city area maps by Martel, Roman, Erdt, Marius, Dong, Chaoqun, Chen, Kan, Johan, Henry

    Published 2019
    “…The city area maps were recorded and stored over a long time period. This imposes several challenges to the pipeline such as different font styles of typewriters, handwritings of different persons, varying layout, low contrast, damages and scanning artifacts. …”
    Get full text
    Get full text
    Conference Paper
  11. 11

    Practical cold boot attack on IoT device - Case study on Raspberry Pi - by Won, Yoo-Seung, Park, Jong-Yeon, Han, Dong-Guk, Bhasin, Shivam

    Published 2021
    “…Volatile memory like SDRAM, forms an integral part of any computer system. It stores variety of data including sensitive data like passwords and PIN. …”
    Get full text
    Conference Paper
  12. 12

    Hardware security assessment through repair of damaged device by Sim, Siang Yee, Liu, Qing, Kor, Katherine Hwee Boon, Gan, Chee Lip

    Published 2024
    “…The repaired device was tested to verify the restoration of its functionality, as well as the integrity of the stored data. This may pave the way for new hardware security assessment approach for electronic devices with other types of packaging.…”
    Get full text
    Conference Paper
  13. 13

    CR-DDPG: cache refreshing for MEC networks with DDPG by Maiti, Ritabrata, Madhukumar, A. S., Tan, Ernest Zheng Hui

    Published 2024
    “…The work presented in this paper explores a common IIoT application scenario wherein autonomous mobile robots (AMR) operate in a MEC-enabled network and depend on multimedia content stored at the MEC servers over the course of operation. …”
    Get full text
    Conference Paper
  14. 14

    Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control by Esiner, Ertem, Datta, Anwitaman

    Published 2017
    “…We also extend the basic protocol to demonstrate how collaboration can be supported even while the stored content is encrypted, and where each collaborator is still restrained from accessing the data through a multi-factor access mechanism. …”
    Get full text
    Get full text
    Conference Paper
  15. 15

    Data insertion and archiving in erasure-coding based large-scale storage systems by Pamies-Juarez, Lluis, Oggier, Frederique, Datta, Anwitaman

    Published 2013
    “…Given the vast volume of data that needs to be stored reliably, many data-centers and large-scale file systems have started using erasure codes to achieve reliable storage while keeping the storage overhead low. …”
    Get full text
    Get full text
    Conference Paper
  16. 16

    Human action recognition using Meta-Cognitive Neuro-Fuzzy Inference System by Suresh, Sundaram, Subramanian, K.

    Published 2013
    “…McFIS decides on what-to-learn, when-to-learn and how-to-learn based on the knowledge stored in the classifier and the information contained in the new training sample. …”
    Get full text
    Get full text
    Conference Paper
  17. 17

    Security evaluation of microcontrollers: a case study in smart watches by Zeng, Xiaomei, Liu, Qing, Chua, Chung Tah, Chef, Samuel, Gan, Chee Lip

    Published 2024
    “…Some of these data are often stored in embedded flash memory in microcontrollers. …”
    Get full text
    Conference Paper
  18. 18

    Search and permission request over encrypted database by Tjuawinata, Ivan, Zhao, Yongjun, Shen, Bowen, Lam, Kwok-Yan, Chi, Chi-Hung

    Published 2024
    “…In this work, we consider a basic scenario where shared data are stored in an encrypted database while still allowing for search requests and permission verification. …”
    Get full text
    Conference Paper
  19. 19

    Packed bed regenerators using cascaded phase change materials : overcharging and possible solutions by Khor, Jun Onn, Li, Yongliang, Romagnoli, Alessandro

    Published 2018
    “…It is also proven that in any of the cases, the efficiency in recovering or storing the high grade cold energy, is improved compared to the baseline cases.…”
    Get full text
    Get full text
    Conference Paper
  20. 20

    Digitally-controlled H-bridge DC-DC converter for micropower PV energy harvesting system by Bui, Anh Khoa, Xiao, Zhekai, Siek, Liter

    Published 2021
    “…The surplus energy is stored in a rechargeable battery. The battery also serves as a secondary input source to provide energy to the output load in heavy-load condition. …”
    Get full text
    Conference Paper