Sciweavers

832 search results - page 119 / 167
» Robust Spelling Correction
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
ICPR
2008
IEEE
14 years 2 months ago
Relative scale estimation between two camera motions
In structure from motion, if two metric structures are given, the unknown scale between them can be resolved by constraining the rigidity of the metric space. There exist two well...
Yekeun Jeong, In-So Kweon
ICPR
2008
IEEE
14 years 2 months ago
Automatic pose estimation of 3D facial models
Pose estimation plays an essential role in many computer vision applications, such as human computer interaction (HCI), driver attentiveness monitoring, face recognition, automati...
Yi Sun, Lijun Yin
ASYNC
2007
IEEE
154views Hardware» more  ASYNC 2007»
14 years 2 months ago
Design of a High-Speed Asynchronous Turbo Decoder
This paper explores the advantages of high performance asynchronous circuits in a semi-custom standard cell environment for high-throughput turbo coding. Turbo codes are high-perf...
Pankaj Golani, Georgios D. Dimou, Mallika Prakash,...
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
14 years 2 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji