Sciweavers

8655 search results - page 1530 / 1731
» Challenges for Trusted Computing
Sort
View
ICDM
2008
IEEE
141views Data Mining» more  ICDM 2008»
15 years 5 months ago
Scalable Tensor Decompositions for Multi-aspect Data Mining
Modern applications such as Internet traffic, telecommunication records, and large-scale social networks generate massive amounts of data with multiple aspects and high dimensiona...
Tamara G. Kolda, Jimeng Sun
ICPP
2008
IEEE
15 years 5 months ago
Enabling Streaming Remoting on Embedded Dual-Core Processors
Dual-core processors (and, to an extent, multicore processors) have been adopted in recent years to provide platforms that satisfy the performance requirements of popular multimed...
Kun-Yuan Hsieh, Yen-Chih Liu, Po-Wen Wu, Shou-Wei ...
ICPR
2008
IEEE
15 years 5 months ago
Robust outdoor text detection using text intensity and shape features
Recognizing texts from camera images is a known hard problem because of the difficulties in text segmentation from the varied and complicated backgrounds. In this paper, we propo...
Zongyi Liu, Sudeep Sarkar
ICRA
2008
IEEE
471views Robotics» more  ICRA 2008»
15 years 5 months ago
Autonomous image-based exploration for mobile robot navigation
— Image-based navigation paradigms have recently emerged as an interesting alternative to conventional modelbased methods in mobile robotics. In this paper, we augment the existi...
D. Santosh, Supreeth Achar, C. V. Jawahar
IEEEPACT
2008
IEEE
15 years 5 months ago
Feature selection and policy optimization for distributed instruction placement using reinforcement learning
Communication overheads are one of the fundamental challenges in a multiprocessor system. As the number of processors on a chip increases, communication overheads and the distribu...
Katherine E. Coons, Behnam Robatmili, Matthew E. T...
« Prev « First page 1530 / 1731 Last » Next »