Image correction is discussed for realizing both effective object recognition and realistiic image-based rendering. Three image normalizations are compared in relation with the li...
Lowering power is one of the greatest challenges facing the IC industry today. We present a power-aware placement method that simultaneously performs (1) activity-based register c...
Yongseok Cheon, Pei-Hsin Ho, Andrew B. Kahng, Sher...
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
This paper presents an approach to affective video summarization based on the facial expressions (FX) of viewers. A facial expression recognition system was deployed to capture a v...
Hideo Joho, Joemon M. Jose, Roberto Valenti, Nicu ...