Sciweavers

1845 search results - page 286 / 369
» Computing the Angularity Tolerance
Sort
View
ASPLOS
1991
ACM
14 years 1 months ago
Code Generation for Streaming: An Access/Execute Mechanism
Access/execute architectures have several advantages over more traditional architectures. Because address generation and memory access are decoupled from operand use, memory laten...
Manuel E. Benitez, Jack W. Davidson
DSN
2009
IEEE
14 years 1 months ago
Precise request tracing and performance debugging for multi-tier services of black boxes
As more and more multi-tier services are developed from commercial components or heterogeneous middleware without the source code available, both developers and administrators nee...
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, D...
ICPR
2010
IEEE
14 years 1 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
BMVC
2002
14 years 10 days ago
Low Density Feature Point Matching for Articulated Pose Identification
We describe a general algorithm for identifying an arbitrary pose of an articulated subject with low density feature points. The algorithm aims to establish a one-to-one correspon...
Horst Holstein, Baihua Li
AINA
2006
IEEE
13 years 12 months ago
DiVES: A Distributed Support for Networked Virtual Environments
This paper presents DiV ES, a distributed support for the development of networked Distributed Virtual Environments. DiV ES exploits the publish subscribe interaction model to def...
A. Bonotti, Luca Genovali, Laura Ricci