Sciweavers

257 search results - page 36 / 52
» Automatic red-eye detection and correction
Sort
View
DATE
2008
IEEE
82views Hardware» more  DATE 2008»
14 years 2 months ago
Variation tolerant NoC design by means of self-calibrating links
We present the implementation and analysis of a variation tolerant version of a switch-to-switch link in a NoC. The goal is to tolerate the effects of process variations on NoC ar...
Simone Medardoni, Marcello Lajolo, Davide Bertozzi
ICASSP
2008
IEEE
14 years 2 months ago
Punctuating speech for information extraction
This paper studies the effect of automatic sentence boundary detection and comma prediction on entity and relation extraction in speech. We show that punctuating the machine gener...
Benoît Favre, Ralph Grishman, Dustin Hillard...
ICDAR
2007
IEEE
14 years 1 months ago
Toponym Recognition in Scanned Color Topographic Maps
Topographic paper maps are a common support for geographical information. In the field of document analysis of this kind of support, this paper proposes an automatic approach to ...
Joachim Pouderoux, Jean-Christophe Gonzato, A. Per...
SIGCOMM
1997
ACM
13 years 11 months ago
Automated Packet Trace Analysis of TCP Implementations
We describe tcpanaly, a tool for automatically analyzing a TCP implementation's behavior by inspecting packet traces of the TCP's activity. Doing so requires surmounting...
Vern Paxson
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...