Sciweavers

2015 search results - page 185 / 403
» Hidden Software Capabilities
Sort
View
CASES
2010
ACM
15 years 18 days ago
Instruction selection by graph transformation
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
Sebastian Buchwald, Andreas Zwinkau
126
Voted
CLOUDCOM
2010
Springer
15 years 17 days ago
A Study in Hadoop Streaming with Matlab for NMR Data Processing
Applying Cloud computing techniques for analyzing large data sets has shown promise in many data-driven scientific applications. Our approach presented here is to use Cloud comput...
Kalpa Gunaratna, Paul Anderson, Ajith Ranabahu, Am...
162
Voted
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
15 years 17 days ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
CVPR
1998
IEEE
16 years 4 months ago
Subtly Different Facial Expression Recognition and Expression Intensity Estimation
We have developed a computer vision system, including both facial feature extraction and recognition, that automatically discriminates among subtly different facial expressions. E...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
150
Voted
CVPR
2004
IEEE
16 years 4 months ago
An Algorithm for Multiple Object Trajectory Tracking
Most tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework called Hidden Markov Model, where the distribution of the object state a...
Mei Han, Wei Xu, Hai Tao, Yihong Gong