Sciweavers

1296 search results - page 192 / 260
» Multiplicative Background Risk
Sort
View
ICIP
2009
IEEE
14 years 11 months ago
Boosting Object Retrieval By Estimating Pseudo-objects
State-of-the-art object retrieval systems are mostly based on the bag-of-visual-words representation which encodes local appearance information of an image in a feature vector. A ...
PAM
2010
Springer
14 years 4 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti
ICC
2008
IEEE
152views Communications» more  ICC 2008»
14 years 4 months ago
MAC Performance of a 3GPP-LTE Multihop Cellular Network
— Multihop cellular networks offer increased coverage and capacity compared to singlehop cells of the same size. This is not as huge as using more base stations (BS) instead of w...
Rainer Schoenen, Rüdiger Halfmann, Bernhard W...
AH
2008
Springer
14 years 4 months ago
Convergence of Web and TV Broadcast Data for Adaptive Content Access and Navigation
Abstract. iFanzy is a personalized TV guide application aiming at offering users television content in a personalized and context-sensitive way. It consists of a client-server syst...
Pieter Bellekens, Kees van der Sluijs, Lora Aroyo,...
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
14 years 4 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji