Sciweavers

83 search results - page 15 / 17
» A model-based WiFi localization method
Sort
View
SIGIR
2005
ACM
15 years 5 months ago
On the collective classification of email "speech acts"
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...
Vitor Rocha de Carvalho, William W. Cohen
ISCA
2003
IEEE
168views Hardware» more  ISCA 2003»
15 years 4 months ago
Temperature-Aware Microarchitecture
With power density and hence cooling costs rising exponentially, processor packaging can no longer be designed for the worst case, and there is an urgent need for runtime processo...
Kevin Skadron, Mircea R. Stan, Wei Huang, Sivakuma...
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
15 years 3 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou
CVPR
2010
IEEE
14 years 11 months ago
A probabilistic framework for joint segmentation and tracking
Most tracking algorithms implicitly apply a coarse segmentation of each target object using a simple mask such as a rectangle or an ellipse. Although convenient, such coarse segme...
Chad Aeschliman, Johnny Park, Avinash C. Kak
CRV
2011
IEEE
337views Robotics» more  CRV 2011»
13 years 11 months ago
Object Detection Using Principal Contour Fragments
Abstract—Contour features play an important role in object recognition. Psychological experiments have shown that maximum-curvature points are most distinctive along a contour [6...
Changhai Xu, Benjamin Kuipers