Sciweavers

396 search results - page 5 / 80
» The missing Wendland functions
Sort
View
HPCA
2005
IEEE
14 years 7 months ago
Effective Instruction Prefetching in Chip Multiprocessors for Modern Commercial Applications
In this paper, we study the instruction cache miss behavior of four modern commercial applications (a database workload, TPC-W, SPECjAppServer2002 and SPECweb99). These applicatio...
Lawrence Spracklen, Yuan Chou, Santosh G. Abraham
MOBIHOC
2010
ACM
13 years 5 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
CVPR
2005
IEEE
14 years 9 months ago
Damped Newton Algorithms for Matrix Factorization with Missing Data
The problem of low-rank matrix factorization in the presence of missing data has seen significant attention in recent computer vision research. The approach that dominates the lit...
A. M. Buchanan, Andrew W. Fitzgibbon
JMLR
2006
87views more  JMLR 2006»
13 years 7 months ago
Second Order Cone Programming Approaches for Handling Missing and Uncertain Data
We propose a novel second order cone programming formulation for designing robust classifiers which can handle uncertainty in observations. Similar formulations are also derived f...
Pannagadatta K. Shivaswamy, Chiranjib Bhattacharyy...
ICIP
2008
IEEE
14 years 9 months ago
Surface completion by minimizing energy based on similarity of shape
3D mesh models generated with range scanner or video images often have holes due to many occlusions by other objects and the object itself. This paper proposes a novel method to f...
Norihiko Kawai, Tomokazu Sato, Naokazu Yokoya