Sciweavers

1016 search results - page 201 / 204
» Explore or Exploit
Sort
View
MICRO
2010
IEEE
186views Hardware» more  MICRO 2010»
13 years 5 months ago
SAFER: Stuck-At-Fault Error Recovery for Memories
As technology scaling poses a threat to DRAM scaling due to physical limitations such as limited charge, alternative memory technologies including several emerging non-volatile me...
Nak Hee Seong, Dong Hyuk Woo, Vijayalakshmi Sriniv...
ICCAD
2009
IEEE
131views Hardware» more  ICCAD 2009»
13 years 5 months ago
Scheduling with soft constraints
In a behavioral synthesis system, a typical approach used to guide the scheduler is to impose hard constraints on the relative timing between operations considering performance, a...
Jason Cong, Bin Liu, Zhiru Zhang
CVPR
2010
IEEE
13 years 4 months ago
Curious snakes: A minimum latency solution to the cluttered background problem in active contours
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedd...
Ganesh Sundaramoorthi, Stefano Soatto, Anthony J. ...
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 2 months ago
Deep Self-Taught Learning for Handwritten Character Recognition
Recent theoretical and empirical work in statistical machine learning has demonstrated the importance of learning algorithms for deep architectures, i.e., function classes obtaine...
Frédéric Bastien, Yoshua Bengio, Arn...
IJIDE
2010
152views more  IJIDE 2010»
13 years 2 months ago
Digital Divide in India: Measurement, Determinants and Policy for Addressing the Challenges in Bridging the Digital Divide
: In the recent years, the notion of `digital divide' has been widely researched, and has attracted much debate and speculation for its economic, social and political conseque...
Sumanjeet Singh