Sciweavers

9186 search results - page 1674 / 1838
» A Module System for Scheme
Sort
View
CVPR
2009
IEEE
14 years 2 months ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
DSD
2009
IEEE
147views Hardware» more  DSD 2009»
14 years 2 months ago
A High Performance Hardware Architecture for One Bit Transform Based Motion Estimation
Motion Estimation (ME) is the most computationally intensive part of video compression and video enhancement systems. One bit transform (1BT) based ME algorithms have low computat...
Abdulkadir Akin, Yigit Dogan, Ilker Hamzaoglu
GIS
2009
ACM
14 years 2 months ago
Dynamic network data exploration through semi-supervised functional embedding
The paper presents a framework for semi-supervised nonlinear embedding methods useful for exploratory analysis and visualization of spatio-temporal network data. The method provid...
Alexei Pozdnoukhov
GLOBECOM
2009
IEEE
14 years 2 months ago
Distributed Power and Carrier Allocation in Multibeam Satellite Uplink with Individual SINR Constraints
Abstract--Current multibeam satellite systems perform centralized power and carrier allocation assuming a Multi-Frequency Time Division Multiple Access (MF-TDMA) scheme with fixed ...
J. E. Barcelo-Llado, Maria Angeles Vázquez-...
ICICS
2007
Springer
14 years 2 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
« Prev « First page 1674 / 1838 Last » Next »