Sciweavers

627 search results - page 102 / 126
» Dual-Buffering Strategies in Object Bases
Sort
View
CVPR
1996
IEEE
14 years 2 months ago
Sparse Representations for Image Decomposition with Occlusions
We study the problem of how to detect \interesting objects" appeared in a given image, I. Our approach is to treat it as a function approximation problem based on an over-red...
Michael J. Donahue, Davi Geiger, Tyng-Luh Liu, Rob...
HYBRID
1997
Springer
14 years 2 months ago
Controller Scheduling Using Neural Networks: Implementation and Experimental Results
This paper presents the results of simulation and control experiments using a recently proposed method for real-time switching among a pool of controllers. The switching strategy ...
Enrique D. Ferreira, Bruce H. Krogh
QOSA
2010
Springer
13 years 11 months ago
Architecture-Driven Reliability and Energy Optimization for Complex Embedded Systems
The use of redundant computational nodes is a widely used design tactic to improve the reliability of complex embedded systems. However, this redundancy allocation has also an effe...
Indika Meedeniya, Barbora Buhnova, Aldeida Aleti, ...
CSCLP
2008
Springer
13 years 11 months ago
Solving CSPs with Naming Games
Abstract. Constraint solving problems (CSPs) represent a formalization of an important class of problems in computer science. We propose here a solving methodology based on the nam...
Stefano Bistarelli, Giorgio Gosti
ICIS
2000
13 years 11 months ago
Initial trust, perceived risk, and the adoption of internet banking
Studieson the adoptionof business-to-consumere-commerce have not simultaneouslyconsideredtrust and risk as important determinants of adoption behavior. Further, trust in informati...
Kyung Kyu Kim, Bipin Prabhakar