Sciweavers

8655 search results - page 1593 / 1731
» Challenges for Trusted Computing
Sort
View
CVPR
2011
IEEE
14 years 1 months ago
An Associate-Predict Model for Face Recognition
Handling intra-personal variation is a major challenge in face recognition. It is difficult how to appropriately measure the similarity between human faces under significantly di...
Qi Yin, Jian Sun, Xiaoou Tang
ICASSP
2011
IEEE
14 years 1 months ago
Belief theoretic methods for soft and hard data fusion
In many contexts, one is confronted with the problem of extracting information from large amounts of different types soft data (e.g., text) and hard data (from e.g., physics-based...
Thanuka Wickramarathne, Kamal Premaratne, Manohar ...
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
14 years 1 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
CHI
2011
ACM
14 years 1 months ago
Eyes-free multitasking: the effect of cognitive load on mobile spatial audio interfaces
As mobile devices increase in functionality, users perform more tasks when on the move. Spatial audio interfaces offer a solution for eyes-free interaction. However, such interfac...
Yolanda Vazquez-Alvarez, Stephen A. Brewster
CHI
2011
ACM
14 years 1 months ago
Apolo: making sense of large network data by combining rich user interaction and machine learning
Extracting useful knowledge from large network datasets has become a fundamental challenge in many domains, from scientific literature to social networks and the web. We introduc...
Duen Horng Chau, Aniket Kittur, Jason I. Hong, Chr...
« Prev « First page 1593 / 1731 Last » Next »