Sciweavers

1493 search results - page 254 / 299
» Petascale computing with accelerators
Sort
View
CCR
2010
169views more  CCR 2010»
13 years 7 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills
EOR
2007
78views more  EOR 2007»
13 years 7 months ago
A Lagrangean relaxation and decomposition algorithm for the video placement and routing problem
Video on Demand (VoD) is a technology used to provide a number of programs to a number of users on request. In developing a VoD system, a fundamental problem is load balancing, wh...
Tolga Bektas, Osman Oguz, Iradj Ouveysi
PRL
2006
163views more  PRL 2006»
13 years 7 months ago
3D target recognition using cooperative feature map binding under Markov Chain Monte Carlo
A robust and effective feature map integration method is presented for infrared (IR) target recognition. Noise in an IR image makes a target recognition system unstable in pose es...
Sungho Kim, In-So Kweon
SIAMIS
2008
279views more  SIAMIS 2008»
13 years 7 months ago
A New Alternating Minimization Algorithm for Total Variation Image Reconstruction
We propose, analyze and test an alternating minimization algorithm for recovering images from blurry and noisy observations with total variation (TV) regularization. This algorith...
Yilun Wang, Junfeng Yang, Wotao Yin, Yin Zhang
RAS
2006
91views more  RAS 2006»
13 years 7 months ago
Visual navigation and obstacle avoidance using a steering potential function
Humans have a remarkable ability to navigate using only vision, but mobile robots have not been nearly as successful. We propose a new approach to vision-guided local navigation, ...
Wesley H. Huang, Brett R. Fajen, Jonathan R. Fink,...