Sciweavers

980 search results - page 120 / 196
» The Architecture Tradeoff Analysis Method
Sort
View
SIGGRAPH
1999
ACM
14 years 4 days ago
Creating Generative Models from Range Images
We describe a new approach for creating concise high-level generative models from range images or other approximate representations of real objects. Using data from a variety of a...
Ravi Ramamoorthi, James Arvo
ADBIS
2009
Springer
162views Database» more  ADBIS 2009»
13 years 12 months ago
Efficient Set Similarity Joins Using Min-prefixes
Identification of all objects in a dataset whose similarity is not less than a specified threshold is of major importance for management, search, and analysis of data. Set similari...
Leonardo Ribeiro, Theo Härder
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
13 years 9 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
EC
2008
175views ECommerce» more  EC 2008»
13 years 8 months ago
Multiobjective Immune Algorithm with Nondominated Neighbor-Based Selection
Nondominated Neighbor Immune Algorithm (NNIA) is proposed for multiobjective optimization by using a novel nondominated neighbor-based selection technique, an immune inspired oper...
Maoguo Gong, Licheng Jiao, Haifeng Du, Liefeng Bo
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler