Sciweavers

692 search results - page 125 / 139
» BDD minimization for approximate computing
Sort
View
JPDC
2006
141views more  JPDC 2006»
14 years 10 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
COMPUTING
2004
204views more  COMPUTING 2004»
14 years 10 months ago
Image Registration by a Regularized Gradient Flow. A Streaming Implementation in DX9 Graphics Hardware
The presented image registration method uses a regularized gradient flow to correlate the intensities in two images. Thereby, an energy functional is successively minimized by des...
Robert Strzodka, Marc Droske, Martin Rumpf
ICCV
2001
IEEE
16 years 10 days ago
3D Object Tracking Using Shape-Encoded Particle Propagation
We present a comprehensive treatment of 3D object tracking by posing it as a nonlinear state estimation problem. The measurements are derived using the outputs of shape-encoded fi...
Hankyu Moon, Rama Chellappa, Azriel Rosenfeld
ICFP
2008
ACM
15 years 10 months ago
Compiling self-adjusting programs with continuations
Self-adjusting programs respond automatically and efficiently to input changes by tracking the dynamic data dependences of the computation and incrementally updating the output as...
Ruy Ley-Wild, Matthew Fluet, Umut A. Acar
SIGUCCS
2005
ACM
15 years 4 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody