Sciweavers

152 search results - page 17 / 31
» An effective similarity metric for application traffic class...
Sort
View
CHI
2011
ACM
12 years 11 months ago
Comet and target ghost: techniques for selecting moving targets
Numerous applications such as simulations, air traffic control systems, and video surveillance systems are inherently composed of spatial objects that move in a scene. In many ins...
Khalad Hasan, Tovi Grossman, Pourang Irani
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 7 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
ICCD
2007
IEEE
105views Hardware» more  ICCD 2007»
13 years 11 months ago
Power-aware mapping for reconfigurable NoC architectures
A core mapping method for reconfigurable network-on-chip (NoC) architectures is presented in this paper. In most of the existing methods, mapping is carried out based on the traff...
Mehdi Modarressi, Hamid Sarbazi-Azad
CVPR
2000
IEEE
14 years 9 months ago
Discriminant-EM Algorithm with Application to Image Retrieval
In Proc. of IEEE Conf. on CVPR'2000, Vol.I, pp.222-227, Hilton Head Island, SC, 2000 In many vision applications, the practice of supervised learning faces several difficulti...
Ying Wu, Qi Tian, Thomas S. Huang
ICIP
2008
IEEE
14 years 1 months ago
Correlation Embedding Analysis
—Beyond conventional linear and kernel-based feature extraction, we present a more generalized formulation for feature extraction in this paper. Two representative algorithms usi...
Yun Fu, Thomas S. Huang