Sciweavers

1617 search results - page 186 / 324
» Using Gaussian Processes to Optimize Expensive Functions
Sort
View
ICIP
2007
IEEE
14 years 5 months ago
Graph-Cut Rate Distortion Algorithm for Contourlet-Based Image Compression
The geometric features of images, such as edges, are difficult to represent. When a redundant transform is used for their extraction, the compression challenge is even more dif...
Maria Trocan, Béatrice Pesquet-Popescu, Jam...
ICASSP
2011
IEEE
13 years 2 months ago
Malicious data attack on real-time electricity market
Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Liyan Jia, Robert J. Thomas, Lang Tong
DATE
2007
IEEE
123views Hardware» more  DATE 2007»
14 years 5 months ago
Clock domain crossing fault model and coverage metric for validation of SoC design
Multiple asynchronous clock domains have been increasingly employed in System-on-Chip (SoC) designs for different I/O interfaces. Functional validation is one of the most expensiv...
Yi Feng 0002, Zheng Zhou, Dong Tong, Xu Cheng
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 8 months ago
Integrating digital human modeling into virtual environment for ergonomic oriented design
Virtual human simulation integrated into virtual reality applications is mainly used for virtual representation of the user in virtual environment or for interactions between the ...
Liang Ma, Damien Chablat, Fouad Bennis, Bo Hu, Wei...
ANCS
2007
ACM
14 years 2 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos