Sciweavers

2168 search results - page 232 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
EMMCVPR
2011
Springer
14 years 4 months ago
Branch and Bound Strategies for Non-maximal Suppression in Object Detection
In this work, we are concerned with the detection of multiple objects in an image. We demonstrate that typically applied objectives have the structure of a random field model, but...
Matthew B. Blaschko
196
Voted
STOC
2012
ACM
192views Algorithms» more  STOC 2012»
13 years 7 months ago
Nearly optimal sparse fourier transform
We consider the problem of computing the k-sparse approximation to the discrete Fourier transform of an ndimensional signal. We show: • An O(k log n)-time randomized algorithm f...
Haitham Hassanieh, Piotr Indyk, Dina Katabi, Eric ...
VLSID
2005
IEEE
89views VLSI» more  VLSID 2005»
16 years 5 months ago
Power Optimization in Current Mode Circuits
We propose a method to minimize power dissipation in current-mode CMOS analog and multiple-valued logic (MVL) circuits employing a stack of current comparators. First, we present ...
M. S. Bhat, H. S. Jamadagni
122
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
How Bad is Single-Path Routing
—This paper investigates the network performance loss of using only single-path routing when multiple paths are available. The performance metric is the aggregate utility achieve...
Meng Wang, Chee Wei Tan, Ao Tang, Steven H. Low
TEX
2004
Springer
283views Latex» more  TEX 2004»
15 years 10 months ago
Creating Type 1 Fonts from METAFONT Sources
This paper summarizes experiences in converting METAFONT fonts to PostScript fonts with TEXtrace and mftrace, based on programs of autotracing bitmaps (AutoTrace and potrace), and...
Karel Píska