Sciweavers

949 search results - page 77 / 190
» ISAC - Instance-Specific Algorithm Configuration
Sort
View
CSREASAM
2010
13 years 6 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
DAGM
2010
Springer
13 years 6 months ago
3D Reconstruction Using an n-Layer Heightmap
We present a novel method for 3D reconstruction of urban scenes extending a recently introduced heightmap model. Our model has several advantages for 3D modeling of urban scenes: i...
David Gallup, Marc Pollefeys, Jan-Michael Frahm
ICCAD
2010
IEEE
158views Hardware» more  ICCAD 2010»
13 years 6 months ago
Novel binary linear programming for high performance clock mesh synthesis
Clock mesh is popular in high performance VLSI design because it is more robust against variations than clock tree at a cost of higher power consumption. In this paper, we propose ...
Minsik Cho, David Z. Pan, Ruchir Puri
AINA
2010
IEEE
13 years 4 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski
ACCV
2010
Springer
13 years 3 months ago
Affordance Mining: Forming Perception through Action
This work employs data mining algorithms to discover visual entities that are strongly associated to autonomously discovered modes of action, in an embodied agent. Mappings are lea...
Liam Ellis, Michael Felsberg, Richard Bowden