Sciweavers

1513 search results - page 289 / 303
» Cryptographic Pattern Matching
Sort
View
ISLPED
2003
ACM
95views Hardware» more  ISLPED 2003»
14 years 28 days ago
Power efficient comparators for long arguments in superscalar processors
Traditional pulldown comparators that are used to implement associativeaddressing logic in superscalar microprocessors dissipate energy on a mismatch in any bit position in the co...
Dmitry Ponomarev, Gurhan Kucuk, Oguz Ergin, Kanad ...
MM
2003
ACM
241views Multimedia» more  MM 2003»
14 years 28 days ago
Invariance in motion analysis of videos
In this paper, we propose an approach that retrieves motion of objects from the videos based on the dynamic time warping of view invariant characteristics. The motion is represent...
Cen Rao, Mubarak Shah, Tanveer Fathima Syeda-Mahmo...
MMDB
2003
ACM
132views Multimedia» more  MMDB 2003»
14 years 28 days ago
Image database retrieval utilizing affinity relationships
Recent research effort in Content-Based Image Retrieval (CBIR) focuses on bridging the gap between low-level features and highlevel semantic contents of images as this gap has bec...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
14 years 19 days ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
WWW
2009
ACM
14 years 10 days ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...