Sciweavers

3356 search results - page 535 / 672
» Determining Consensus Numbers
Sort
View
VSTTE
2012
Springer
12 years 5 months ago
Infeasible Code Detection
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating execution of the program. We develop an algorithm for the automatic detection o...
Cristiano Bertolini, Martin Schäf, Pascal Sch...
CVPR
2012
IEEE
12 years 1 months ago
Contextual Boost for Pedestrian Detection
Pedestrian detection from images is an important and yet challenging task. The conventional methods usually identify human figures using image features inside the local regions. In...
Yuanyuan Ding, Jing Xiao
INFOCOM
2012
IEEE
12 years 21 days ago
Toward simple criteria to establish capacity scaling laws for wireless networks
Abstract—Capacity scaling laws offer fundamental understanding on the trend of user throughput behavior when the network size increases. Since the seminal work of Gupta and Kumar...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
CVPR
2012
IEEE
12 years 20 days ago
Urban tribes: Analyzing group photos from a social perspective
The explosive growth in image sharing via social networks has produced exciting opportunities for the computer vision community in areas including face, text, product and scene re...
Ana C. Murillo, Iljung S. Kwak, Lubomir Bourdev, D...
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
12 years 20 days ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...