Sciweavers

1585 search results - page 245 / 317
» Automatically optimizing secure computation
Sort
View
DAC
2002
ACM
16 years 24 days ago
Constraint-driven communication synthesis
Constraint-driven Communication Synthesis enables the automatic design of the communication architecture of a complex system from a library of pre-defined Intellectual Property (I...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...
CVPR
2010
IEEE
1639views Computer Vision» more  CVPR 2010»
15 years 8 months ago
Multi-Target Tracking of Time-varying Spatial Patterns
Time-varying spatial patterns are common, but few computational tools exist for discovering and tracking multiple, sometimes overlapping, spatial structures of targets. We propose...
Jingchen Liu, Yanxi Liu
MM
2009
ACM
169views Multimedia» more  MM 2009»
15 years 6 months ago
Visual speaker localization aided by acoustic models
The following paper presents a novel audio-visual approach for unsupervised speaker locationing. Using recordings from a single, low-resolution room overview camera and a single f...
Gerald Friedland, Chuohao Yeo, Hayley Hung
ICPR
2008
IEEE
15 years 6 months ago
Adaptive context recognition based on audio signal
Auditory data provide many contextual cues about the crucial content of environments around. The goal of audio based context recognition is to equip the sensing devices with class...
Zhi Zeng, Xin Li, Xiaohong Ma, Qiang Ji
ICDCS
2003
IEEE
15 years 5 months ago
Compiler Scheduling of Mobile Agents for Minimizing Overheads
Mobile code carried by a mobile agent can automatically travel to several data sources in order to complete a designated program. Traditionally, most mobile agent systems [7][8][1...
Xiaotong Zhuang, Santosh Pande