Sciweavers

2490 search results - page 385 / 498
» A General Method for Feature Matching and Model Extraction
Sort
View
205
Voted
MM
2004
ACM
277views Multimedia» more  MM 2004»
15 years 8 months ago
Avatar-mediated face tracking and lip reading for human computer interaction
Advanced human computer interaction requires automatic reading of human face in order to make the computer interact with human in the same way as human-to-human communication. We ...
Xiaozhou Wei, Lijun Yin, Zhiwei Zhu, Qiang Ji
125
Voted
DATESO
2010
96views Database» more  DATESO 2010»
15 years 1 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
138
Voted
POPL
2012
ACM
13 years 11 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...
120
Voted
HPCA
2008
IEEE
16 years 3 months ago
Fundamental performance constraints in horizontal fusion of in-order cores
A conceptually appealing approach to supporting a broad range of workloads is a system comprising many small cores that can be fused, on demand, into larger cores. We demonstrate ...
Pierre Salverda, Craig B. Zilles
133
Voted
ANCS
2006
ACM
15 years 7 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo