Sciweavers

231 search results - page 32 / 47
» Sensitivity of trust-region algorithms to their parameters
Sort
View
VLDB
1994
ACM
114views Database» more  VLDB 1994»
13 years 10 months ago
On Index Selection Schemes for Nested Object Hierarchies
In this paper we address the problem of devising a set of indexes for a nested object hierarchy in an object-oriented database to improve the overall system performance. It is not...
Sudarshan S. Chawathe, Ming-Syan Chen, Philip S. Y...
IVC
2007
266views more  IVC 2007»
13 years 6 months ago
Face detection and facial feature localization without considering the appearance of image context
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Effi...
Suphakant Phimoltares, Chidchanok Lursinsap, Kosin...
EMSOFT
2007
Springer
14 years 27 days ago
Methods for multi-dimensional robustness optimization in complex embedded systems
Design space exploration of embedded systems typically focuses on classical design goals such as cost, timing, buffer sizes, and power consumption. Robustness criteria, i.e. sensi...
Arne Hamann, Razvan Racu, Rolf Ernst
ICRA
2005
IEEE
178views Robotics» more  ICRA 2005»
14 years 10 days ago
Robust Contrast Invariant Stereo Correspondence
— A stereo pair of cameras attached to a robot will inevitably yield images with different contrast. Even if we assume that the camera hardware is identical, due to slightly diff...
Abhijit S. Ogale, Yiannis Aloimonos
HPCC
2005
Springer
14 years 7 days ago
Exploring Regression for Mining User Moving Patterns in a Mobile Computing System
In this paper, by exploiting the log of call detail records, we present a solution procedure of mining user moving patterns in a mobile computing system. Specifically, we propose ...
Chih-Chieh Hung, Wen-Chih Peng, Jiun-Long Huang