Sciweavers

910 search results - page 157 / 182
» Fractal-Based Techniques for a Generalized Image Coding Meth...
Sort
View
CASES
2006
ACM
14 years 23 days ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
DRM
2007
Springer
14 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
MIR
2006
ACM
145views Multimedia» more  MIR 2006»
14 years 3 months ago
Similarity learning via dissimilarity space in CBIR
In this paper, we introduce a new approach to learn dissimilarity for interactive search in content based image retrieval. In literature, dissimilarity is often learned via the fe...
Giang P. Nguyen, Marcel Worring, Arnold W. M. Smeu...
GLVLSI
2002
IEEE
109views VLSI» more  GLVLSI 2002»
14 years 2 months ago
Minimizing resources in a repeating schedule for a split-node data-flow graph
Many computation-intensive or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graphs (DFGs). ...
Timothy W. O'Neil, Edwin Hsing-Mean Sha
SIGGRAPH
1998
ACM
14 years 1 months ago
Multiple Viewpoint Rendering
This paper presents an algorithm for rendering a static scene from multiple perspectives. While most current computer graphics algorithms render scenes as they appear from a singl...
Michael Halle