Sciweavers

4110 search results - page 788 / 822
» Efficient algorithms for the 2-gathering problem
Sort
View
137
Voted
ICCAD
1999
IEEE
125views Hardware» more  ICCAD 1999»
15 years 8 months ago
Direct synthesis of timed asynchronous circuits
This paper presents a new method to synthesize timed asynchronous circuits directly from the specification without generating a state graph. The synthesis procedure begins with a ...
Sung Tae Jung, Chris J. Myers
147
Voted
INFOCOM
1999
IEEE
15 years 8 months ago
Inference of Multicast Routing Trees and Bottleneck Bandwidths Using End-to-end Measurements
Abstract-- The efficacy of end-to-end multicast transport protocols depends critically upon their ability to scale efficiently to a large number of receivers. Several research mult...
Sylvia Ratnasamy, Steven McCanne
141
Voted
ICFHR
2010
193views Biometrics» more  ICFHR 2010»
14 years 10 months ago
A New Method for Handwritten Scene Text Detection in Video
There are many video images where hand written text may appear. Therefore handwritten scene text detection in video is essential and useful for many applications for efficient ind...
Palaiahnakote Shivakumara, Anjan Dutta, Umapada Pa...
153
Voted
JMLR
2010
115views more  JMLR 2010»
14 years 10 months ago
O-IPCAC and its Application to EEG Classification
In this paper we describe an online/incremental linear binary classifier based on an interesting approach to estimate the Fisher subspace. The proposed method allows to deal with ...
Alessandro Rozza, Gabriele Lombardi, Marco Rosa, E...
170
Voted
TDP
2010
189views more  TDP 2010»
14 years 10 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...