Sciweavers

2421 search results - page 406 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
GLVLSI
2010
IEEE
210views VLSI» more  GLVLSI 2010»
14 years 3 months ago
Overscaling-friendly timing speculation architectures
Processors have traditionally been designed for the worst-case, resulting in designs that have high yields, but are expensive in terms of area and power. Better-than-worst-case (B...
John Sartori, Rakesh Kumar
DICS
2006
13 years 12 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
CIKM
2003
Springer
14 years 3 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber
ECCV
2000
Springer
14 years 12 months ago
Camera Pose Estimation and Reconstruction from Image Profiles under Circular Motion
Abstract. This paper addresses the problem of motion estimation and reconstruction of 3D models from profiles of an object rotating on a turntable, obtained from a single camera. I...
Paulo R. S. Mendonça, Kwan-Yee Kenneth Wong...
ICDM
2003
IEEE
95views Data Mining» more  ICDM 2003»
14 years 3 months ago
Evolutionary Gabor Filter Optimization with Application to Vehicle Detection
Abstract—Despite the considerable amount of research work on the application of Gabor filters in pattern classification, their design and selection have been mostly done on a t...
Zehang Sun, George Bebis, Ronald Miller