Sciweavers

1929 search results - page 339 / 386
» An Approach to Limit the Wynot Problem
Sort
View
CODES
2006
IEEE
14 years 2 months ago
Retargetable code optimization with SIMD instructions
Retargetable C compilers are nowadays widely used to quickly obtain compiler support for new embedded processors and to perform early processor architecture exploration. One frequ...
Manuel Hohenauer, Christoph Schumacher, Rainer Leu...
FGR
2006
IEEE
157views Biometrics» more  FGR 2006»
14 years 2 months ago
Evaluating Error Functions for Robust Active Appearance Models
Active appearance models (AAMs) are generative parametric models commonly used to track faces in video sequences. A limitation of AAMs is they are not robust to occlusion. A recen...
Barry-John Theobald, Iain Matthews, Simon Baker
IPPS
2006
IEEE
14 years 2 months ago
Sim-X: parallel system software for interactive multi-experiment computational studies
Advances in high-performance computing have led to the broad use of computational studies in everyday engineering and scientific applications. A single study may require thousand...
Siu-Man Yau, Eitan Grinspun, Vijay Karamcheti, Den...
SUTC
2006
IEEE
14 years 2 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ACMICEC
2006
ACM
150views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
A framework for managing optimization models for supply chain software agents
As third party logistic services become popular, the role of software agents increases in importance in terms of the logistics scheduling of buyers and sellers. To support many mo...
Jae Kyu Lee, Yong Sik Chang