Sciweavers

11384 search results - page 452 / 2277
» Achieved IPC Performance
Sort
View
ICPR
2008
IEEE
15 years 11 months ago
Online personal identification in night using multiple face representations
This paper details a fully automated face authentication system using low-cost near infrared imaging. The image normalization step consists of eye center localization, scale corre...
Ajay Kumar, T. Srikanth
154
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes
— In this paper, we concentrate on opportunistic scheduling for multicast information. We pose the problem as a multicast throughput optimization problem. As a solution we presen...
Ulas C. Kozat
IRI
2008
IEEE
15 years 11 months ago
Robust integration of multiple information sources by view completion
There are many applications where multiple data sources, each with its own features, are integrated in order to perform an inference task in an optimal way. Researchers have shown...
Shankara B. Subramanya, Baoxin Li, Huan Liu
ISCA
2008
IEEE
92views Hardware» more  ISCA 2008»
15 years 11 months ago
Counting Dependence Predictors
Modern processors rely on memory dependence prediction to execute load instructions as early as possible, speculating that they are not dependent on an earlier, unissued store. To...
Franziska Roesner, Doug Burger, Stephen W. Keckler
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
15 years 11 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...