Sciweavers

2395 search results - page 274 / 479
» A comparative study of two object recognition methods
Sort
View
137
Voted
MICRO
2000
IEEE
96views Hardware» more  MICRO 2000»
15 years 8 months ago
Instruction distribution heuristics for quad-cluster, dynamically-scheduled, superscalar processors
We investigate instruction distribution methods for quadcluster, dynamically-scheduled superscalar processors. We study a variety of methods with different cost, performance and c...
Amirali Baniasadi, Andreas Moshovos
GECCO
2004
Springer
15 years 9 months ago
Improving Generalisation Performance Through Multiobjective Parsimony Enforcement
This paper describes POPE-GP, a system that makes use of the NSGA-II multiobjective evolutionary algorithm as an alternative, parameter-free technique for eliminating program bloat...
Yaniv Bernstein, Xiaodong Li, Victor Ciesielski, A...
ICPP
2008
IEEE
15 years 10 months ago
Bounded LSH for Similarity Search in Peer-to-Peer File Systems
Similarity search has been widely studied in peer-to-peer environments. In this paper, we propose the Bounded Locality Sensitive Hashing (Bounded LSH) method for similarity search...
Yu Hua, Bin Xiao, Dan Feng, Bo Yu
TEI
2012
ACM
256views Hardware» more  TEI 2012»
13 years 11 months ago
Situated modeling: a shape-stamping interface with tangible primitives
Existing 3D sketching methods typically allow the user to draw in empty space which is imprecise and lacks tactile feedback. We introduce a shape-stamping interface where users ca...
Manfred Lau, Masaki Hirose, Akira Ohgawara, Jun Mi...
ECCV
2006
Springer
16 years 5 months ago
Conditional Infomax Learning: An Integrated Framework for Feature Extraction and Fusion
The paper introduces a new framework for feature learning in classification motivated by information theory. We first systematically study the information structure and present a n...
Dahua Lin, Xiaoou Tang