Sciweavers

5766 search results - page 1105 / 1154
» Reverse Engineering of Data
Sort
View
127
Voted
MM
2009
ACM
137views Multimedia» more  MM 2009»
15 years 10 months ago
Lightweight web image reranking
Web image search is inspired by text search techniques; it mainly relies on indexing textual data that surround the image file. But retrieval results are often noisy and image pro...
Adrian Popescu, Pierre-Alain Moëllic, Ioannis...
126
Voted
SACMAT
2009
ACM
15 years 10 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
136
Voted
VRST
2009
ACM
15 years 10 months ago
Gaze behavior and visual attention model when turning in virtual environments
In this paper we analyze and try to predict the gaze behavior of users navigating in virtual environments. We focus on first-person navigation in virtual environments which invol...
Sébastien Hillaire, Anatole Lécuyer,...
140
Voted
CODES
2008
IEEE
15 years 10 months ago
Speculative DMA for architecturally visible storage in instruction set extensions
Instruction set extensions (ISEs) can accelerate embedded processor performance. Many algorithms for ISE generation have shown good potential; some of them have recently been expa...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
CODES
2008
IEEE
15 years 10 months ago
Distributed flit-buffer flow control for networks-on-chip
The combination of flit-buffer flow control methods and latency-insensitive protocols is an effective solution for networks-on-chip (NoC). Since they both rely on backpressure...
Nicola Concer, Michele Petracca, Luca P. Carloni
« Prev « First page 1105 / 1154 Last » Next »