Sciweavers

7200 search results - page 1183 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
CVPR
2000
IEEE
14 years 3 months ago
Step towards Sequence-to-Sequence Alignment
This paper presents an approach for establishing correspondencesin time and in space between two differentvideo sequences of the same dynamic scene, recorded by stationary uncalib...
Yaron Caspi, Michal Irani
INFOVIS
2000
IEEE
14 years 3 months ago
Visualizing Sequential Patterns for Text Mining
A sequential pattern in data mining is a finite series of elements such as A → B → C → D where A, B, C, and D are elements of the same domain. The mining of sequential patte...
Pak Chung Wong, Wendy Cowley, Harlan Foote, Elizab...
UIST
2000
ACM
14 years 3 months ago
Sensing techniques for mobile interaction
We describe sensing techniques motivated by unique aspects of human-computer interaction with handheld devices in mobile settings. Special features of mobile interaction include c...
Ken Hinckley, Jeffrey S. Pierce, Mike Sinclair, Er...
VRML
2000
ACM
14 years 3 months ago
3D behavioral model design for simulation and software engineering
Modeling is used to build structures that serve as surrogates for other objects. As children, we learn to model at a very young age. An object such as a small toy train teaches us...
Paul A. Fishwick
ISLPED
1999
ACM
236views Hardware» more  ISLPED 1999»
14 years 3 months ago
Modeling and automating selection of guarding techniques for datapath elements
While guarded evaluation has proven an effective energy saving technique in arithmetic circuits, good methodologies do not exist for determining when and how to guard for maximal ...
William E. Dougherty, Donald E. Thomas
« Prev « First page 1183 / 1440 Last » Next »