Sciweavers

1209 search results - page 213 / 242
» Security as a new dimension in embedded system design
Sort
View
FPL
2009
Springer
156views Hardware» more  FPL 2009»
14 years 5 days ago
A highly scalable Restricted Boltzmann Machine FPGA implementation
Restricted Boltzmann Machines (RBMs) — the building block for newly popular Deep Belief Networks (DBNs) — are a promising new tool for machine learning practitioners. However,...
Sang Kyun Kim, Lawrence C. McAfee, Peter L. McMaho...
SIGGRAPH
2010
ACM
14 years 21 hour ago
Unstructured video-based rendering: interactive exploration of casually captured videos
We present an algorithm designed for navigating around a performance that was filmed as a “casual” multi-view video collection: real-world footage captured on hand held camer...
Luca Ballan, Gabriel J. Brostow, Jens Puwein, Marc...
VLSID
1999
IEEE
99views VLSI» more  VLSID 1999»
13 years 11 months ago
Array Index Allocation under Register Constraints in DSP Programs
Abstract Code optimization for digital signal processors DSPs has been identi ed as an important new topic in system-level design of embedded systems. Both DSP processors and algor...
Anupam Basu, Rainer Leupers, Peter Marwedel
CEC
2009
IEEE
13 years 11 months ago
A model for intrinsic artificial development featuring structural feedback and emergent growth
Abstract--A model for intrinsic artificial development is introduced in this paper. The proposed model features a novel mechanism where growth emerges, rather than being triggered ...
Martin Trefzer, Tüze Kuyucu, Julian Francis M...
ER
2006
Springer
137views Database» more  ER 2006»
13 years 11 months ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng