Sciweavers

739 search results - page 104 / 148
» System Design of Smart Table
Sort
View
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
14 years 1 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
CORR
2006
Springer
103views Education» more  CORR 2006»
13 years 8 months ago
AS Relationships: Inference and Validation
Research on performance, robustness, and evolution of the global Internet is fundamentally handicapped without accurate and thorough knowledge of the nature and structure of the c...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, M...
ICASSP
2009
IEEE
14 years 2 months ago
LSH banding for large-scale retrieval with memory and recall constraints
Locality Sensitive Hashing (LSH) is widely used for efficient retrieval of candidate matches in very large audio, video, and image systems. However, extremely large reference dat...
Michele Covell, Shumeet Baluja
DATE
2008
IEEE
139views Hardware» more  DATE 2008»
14 years 2 months ago
Instruction Re-encoding Facilitating Dense Embedded Code
Reducing the code size of embedded applications is one of the important constraint in embedded system design. Code compression can provide substantial savings in terms of size. In...
Talal Bonny, Jörg Henkel
IEEEICCI
2007
IEEE
14 years 2 months ago
A Logic Language of Granular Computing
Granular computing concerns human thinking and problem solving, as well as their implications to the design of knowledge intensive systems. It simplifies complex real world probl...
Yiyu Yao, Bing Zhou