Sciweavers

1016 search results - page 90 / 204
» Explore or Exploit
Sort
View
ATS
1997
IEEE
89views Hardware» more  ATS 1997»
14 years 1 months ago
Guaranteeing Testability in Re-encoding for Low Power
This paper considers the testability implications of low power design methodologies. Low power and high testability are shown to be highly contrasting requirements, and an optimiz...
Silvia Chiusano, Fulvio Corno, Paolo Prinetto, Mau...
RT
1998
Springer
14 years 1 months ago
Global Ray-Bundle Tracing with Hardware Acceleration
The paper presents a single-pass, view-dependent method to solve the general rendering equation, using a combined finite element and random walk approach. Applying finite element t...
László Szirmay-Kalos, Werner Purgath...
VLDB
1997
ACM
169views Database» more  VLDB 1997»
14 years 1 months ago
Mining Insurance Data at Swiss Life
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Jörg-Uwe Kietz, Ulrich Reimer, Martin Staudt
PARLE
1994
14 years 1 months ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki
CIVR
2004
Springer
205views Image Analysis» more  CIVR 2004»
14 years 28 days ago
Finding Person X: Correlating Names with Visual Appearances
People as news subjects carry rich semantics in broadcast news video and therefore finding a named person in the video is a major challenge for video retrieval. This task can be ac...
Jun Yang 0003, Ming-yu Chen, Alexander G. Hauptman...