Sciweavers

1580 search results - page 61 / 316
» Non-Interference Through Determinism
Sort
View
ICDAR
2011
IEEE
12 years 8 months ago
A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther
—We propose a novel method to evaluate table segmentation results based on a table image ground truther. In the ground-truthing process, we first extract connected components fr...
Yanhui Liang, Yizhou Wang, Eric Saund
CVPR
2012
IEEE
11 years 12 months ago
Contextual Boost for Pedestrian Detection
Pedestrian detection from images is an important and yet challenging task. The conventional methods usually identify human figures using image features inside the local regions. In...
Yuanyuan Ding, Jing Xiao
INFOCOM
2012
IEEE
11 years 11 months ago
Toward simple criteria to establish capacity scaling laws for wireless networks
Abstract—Capacity scaling laws offer fundamental understanding on the trend of user throughput behavior when the network size increases. Since the seminal work of Gupta and Kumar...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
11 years 11 months ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...
ICDE
2005
IEEE
194views Database» more  ICDE 2005»
14 years 10 months ago
Sentiment Mining in WebFountain
WebFountain is a platform for very large-scale text analytics applications that allows uniform access to a wide variety of sources. It enables the deployment of a variety of docum...
Jeonghee Yi, Wayne Niblack