Sciweavers

1056 search results - page 46 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
IH
2004
Springer
14 years 1 months ago
Reversing Global and Local Geometrical Distortions in Image Watermarking
A new method improving watermark robustness against both global and local geometrical distortions is presented in this article. The proposed approach is based on a self-reference c...
Dariusz Bogumil
IPTPS
2004
Springer
14 years 1 months ago
Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming
Abstract— We consider the problem of supporting bandwidth heterogeneity and congestion control in the context of P2P multicast streaming. We identify several challenges peculiar ...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...
ICRA
2000
IEEE
132views Robotics» more  ICRA 2000»
14 years 3 days ago
Neural Network Based Target Differentiation using Sonar for Robotics Applications
—This study investigates the processing of sonar signals using neural networks for robust differentiation of commonly encountered features in indoor robot environments. The neura...
Billur Barshan, Birsel Ayrulu, Simukai W. Utete
DAC
1999
ACM
14 years 17 hour ago
Leakage Control with Efficient Use of Transistor Stacks in Single Threshold CMOS
The state dependence of leakage can be exploited to obtain modest leakage savings in CMOS circuits. However, one can modify circuits considering state dependence and achieve large...
Mark C. Johnson, Dinesh Somasekhar, Kaushik Roy
MICRO
1999
IEEE
136views Hardware» more  MICRO 1999»
13 years 12 months ago
Read-After-Read Memory Dependence Prediction
: We identify that typical programs exhibit highly regular read-after-read (RAR) memory dependence streams. We exploit this regularity by introducing read-after-read (RAR) memory d...
Andreas Moshovos, Gurindar S. Sohi