Sciweavers

2201 search results - page 187 / 441
» Improvement of ASIC Design Processes
Sort
View
203
Voted
TKDE
2008
378views more  TKDE 2008»
15 years 3 months ago
Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases
In this paper, we propose an image semantic model based on the knowledge and criteria in the field of linguistics and taxonomy. Our work bridges the "semantic gap" by sea...
Xiaoyan Li, Lidan Shou, Gang Chen, Tianlei Hu, Jin...
116
Voted
PE
2007
Springer
130views Optimization» more  PE 2007»
15 years 3 months ago
Performability analysis of clustered systems with rejuvenation under varying workload
This paper develops time-based rejuvenation policies to improve the performability measures of a cluster system. Three rejuvenation policies, namely standard rejuvenation, delayed...
Dazhi Wang, Wei Xie, Kishor S. Trivedi
158
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Application specific loss minimization using gradient boosting
Gradient boosting is a flexible machine learning technique that produces accurate predictions by combining many weak learners. In this work, we investigate its use in two applica...
Bin Zhang, Abhinav Sethy, Tara N. Sainath, Bhuvana...
114
Voted
GLVLSI
2003
IEEE
134views VLSI» more  GLVLSI 2003»
15 years 9 months ago
Modeling QCA for area minimization in logic synthesis
Concerned by the wall that Moore’s Law is expected to hit in the next decade, the integrated circuit community is turning to emerging nanotechnologies for continued device impro...
Nadine Gergel, Shana Craft, John Lach
131
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Embedded Fingerprint Verification System
Fingerprint verification is one of the most reliable personal identification methods in biometrics. In this paper, an effective fingerprint verification system is presented. We de...
Gwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, S...