Sciweavers

988 search results - page 33 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ASPDAC
2007
ACM
98views Hardware» more  ASPDAC 2007»
13 years 10 months ago
A Software Technique to Improve Yield of Processor Chips in Presence of Ultra-Leaky SRAM Cells Caused by Process Variation
- Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower threshold voltage and its increased variation. Such leaky transistors may e...
Maziar Goudarzi, Tohru Ishihara, Hiroto Yasuura
SCIA
2007
Springer
151views Image Analysis» more  SCIA 2007»
14 years 3 months ago
A PCA-Based Technique to Detect Moving Objects
Abstract. Moving objects detection is a crucial step for video surveillance systems. The segmentation performed by motion detection algorithms is often noisy, which makes it hard t...
Nicolas Verbeke, Nicole Vincent
IV
1999
IEEE
133views Visualization» more  IV 1999»
14 years 1 months ago
A Robust Image Mosaicing Technique Capable of Creating Integrated Panoramas
Existing featureless image mosaicing techniques do not pay enough attention to the robustness of the image registration process, and are not able to combine multiple video sequenc...
Yihong Gong, Guido Proietti, David LaRose
EMSOFT
2004
Springer
14 years 18 days ago
Separation of concerns: overhead in modeling and efficient simulation techniques
Separating the description of important aspects of a design such as behavior and architecture, or computation and communication, may yield significant advantages in design time as...
Guang Yang 0004, Alberto L. Sangiovanni-Vincentell...
ICPR
2000
IEEE
14 years 10 months ago
Cooperation between Level Set Techniques and Dense 3D Registration for the Segmentation of Brain Structures
This paper presents a cooperative strategy between volumetric registration and segmentation. The segmentation method is based on the level set formalism. Starting from an initial ...
C. Baillard, Pierre Hellier, Christian Barillot