Sciweavers

1448 search results - page 244 / 290
» Restricted Stack Implementations
Sort
View
TNN
2008
94views more  TNN 2008»
13 years 7 months ago
Individual Stable Space: An Approach to Face Recognition Under Uncontrolled Conditions
There usually exist many kinds of variations in face images taken under uncontrolled conditions, such as changes of pose, illumination, expression, etc. Most previous works on fac...
Xin Geng, Zhi-Hua Zhou, Kate Smith-Miles
JMIV
2007
99views more  JMIV 2007»
13 years 7 months ago
Image Similarity Based on Intensity Scaling
An image similarity measure based upon intensity scaling is investigated for the registration of images which differ in contast. The measure is introduced for both optical flow a...
Stephen L. Keeling
TVLSI
2008
115views more  TVLSI 2008»
13 years 7 months ago
Outer Loop Pipelining for Application Specific Datapaths in FPGAs
Most hardware compilers apply loop pipelining to increase the parallelism achieved, but pipelining is restricted to the only innermost level in a nested loop. In this work we exten...
Kieron Turkington, Turkington A. Constantinides, K...
DPD
2002
97views more  DPD 2002»
13 years 7 months ago
Dictatorial Transaction Processing: Atomic Commitment Without Veto Right
The current standard in governing distributed transaction termination is the so-called Two-Phase Commit protocol (2PC). The first phase of 2PC is a voting phase, where the partici...
Maha Abdallah, Rachid Guerraoui, Philippe Pucheral
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 7 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You