Sciweavers

1444 search results - page 230 / 289
» On Variations of Power Iteration
Sort
View
185
Voted
ICAS
2008
IEEE
274views Robotics» more  ICAS 2008»
15 years 9 months ago
Model-Driven Engineering of Multi-target Plastic User Interfaces
A Multi-target user interface is composed of a series of interconnected variations of the same user interfaces, but tailored for different targets or different contexts of use. Wh...
Benoît Collignon, Jean Vanderdonckt, Gaë...
ICASSP
2008
IEEE
15 years 9 months ago
Distributed compressed sensing: Sparsity models and reconstruction algorithms using annihilating filter
Consider a scenario where a distributed signal is sparse and is acquired by various sensors that see different versions. Thus, we have a set of sparse signals with both some commo...
Ali Hormati, Martin Vetterli
133
Voted
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
15 years 9 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee
ICPP
2008
IEEE
15 years 9 months ago
Thermal Management for 3D Processors via Task Scheduling
A rising horizon in chip fabrication is the 3D integration technology. It stacks two or more dies vertically with a dense, high-speed interface to increase the device density and ...
Xiuyi Zhou, Yi Xu, Yu Du, Youtao Zhang, Jun Yang 0...
118
Voted
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 9 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...