Sciweavers

335 search results - page 58 / 67
» Closing a Million-Landmarks Loop
Sort
View
RTAS
2005
IEEE
15 years 3 months ago
Bounding Worst-Case Data Cache Behavior by Analytically Deriving Cache Reference Patterns
While caches have become invaluable for higher-end architectures due to their ability to hide, in part, the gap between processor speed and memory access times, caches (and partic...
Harini Ramaprasad, Frank Mueller
SIGMETRICS
2004
ACM
108views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
Uncooperative congestion control
—Traditionally uncooperative rate control schemes have implied open loop protocols such as UDP, CBR. In this paper we show that closed loop uncooperative rate control schemes als...
Kartikeya Chandrayana, Shivkumar Kalyanaraman
ICCV
1999
IEEE
15 years 11 months ago
Differential Matching Constraints
We introduce a finite difference expansion for closely spaced cameras in projective vision, and use it to derive differential analogues of the finite-displacement projective match...
Bill Triggs
79
Voted
ECCV
2002
Springer
15 years 11 months ago
Recognizing and Tracking Human Action
Human activity can be described as a sequence of 3D body postures. The traditional approach to recognition and 3D reconstruction of human activity has been to track motion in 3D, m...
Josephine Sullivan, Stefan Carlsson
77
Voted
DAC
2000
ACM
15 years 10 months ago
Hardware-software co-design of embedded reconfigurable architectures
In this paper we describe a new hardware/software partitioning approach for embedded reconfigurable architectures consisting of a general-purpose processor (CPU), a dynamically re...
Yanbing Li, Tim Callahan, Ervan Darnell, Randolph ...