Sciweavers

1920 search results - page 168 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
SASP
2008
IEEE
101views Hardware» more  SASP 2008»
15 years 10 months ago
Custom Processor Core Construction from C Code
—In this paper we present a method for construction of application specific processor cores from a given C code. Our approach consists of three phases. We start by quantifying t...
Jelena Trajkovic, Daniel D. Gajski
AVSS
2007
IEEE
15 years 10 months ago
Vision based anti-collision system for rail track maintenance vehicles
Maintenance trains travel in convoy. In Australia, only the first train of the convoy pays attention to the track signalization (the other convoy vehicles simply follow the prece...
Frédéric Maire
NOSSDAV
2005
Springer
15 years 9 months ago
Adjusting forward error correction with quality scaling for streaming MPEG
Packet loss can severely impact streaming video quality. Repair techniques protect streaming video from packet loss but at the price of a reduced effective transmission rate when...
Huahui Wu, Mark Claypool, Robert E. Kinicki
INFOCOM
2002
IEEE
15 years 9 months ago
ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies.
—Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost ...
Alberto Cerpa, Deborah Estrin
ACCV
2007
Springer
15 years 8 months ago
Efficiently Solving the Fractional Trust Region Problem
Normalized Cuts has successfully been applied to a wide range of tasks in computer vision, it is indisputably one of the most popular segmentation algorithms in use today. A number...
Anders P. Eriksson, Carl Olsson, Fredrik Kahl