Sciweavers

1585 search results - page 125 / 317
» Automatically optimizing secure computation
Sort
View
DAC
2003
ACM
14 years 9 months ago
Clock-tree power optimization based on RTL clock-gating
As power consumption of the clock tree in modern VLSI designs tends to dominate, measures must be taken to keep it under control. This paper introduces an approach for reducing cl...
Monica Donno, Alessandro Ivaldi, Luca Benini, Enri...
FGR
2008
IEEE
152views Biometrics» more  FGR 2008»
14 years 2 months ago
Facial feature detection with optimal pixel reduction SVM
Automatic facial feature localization has been a longstanding challenge in the field of computer vision for several decades. This can be explained by the large variation a face i...
Minh Hoai Nguyen, Joan Perez, Fernando De la Torre
NOSSDAV
2005
Springer
14 years 1 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
SAC
2000
ACM
14 years 13 days ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
CHI
2006
ACM
14 years 8 months ago
Gaze-based interaction for semi-automatic photo cropping
We present an interactive method for cropping photographs given minimal information about the location of important content, provided by eye tracking. Cropping is formulated in a ...
Anthony Santella, Maneesh Agrawala, Douglas DeCarl...