Sciweavers

681 search results - page 92 / 137
» Columnar objects: improving the performance of analytical ap...
Sort
View
ICB
2007
Springer
139views Biometrics» more  ICB 2007»
15 years 2 months ago
Tracking and Recognition of Multiple Faces at Distances
Many applications require tracking and recognition of multiple faces at distances, such as in video surveillance. Such a task, dealing with non-cooperative objects is more challeng...
Rong Liu, Xiufeng Gao, Rufeng Chu, XiangXin Zhu, S...
CIKM
2008
Springer
15 years 1 months ago
Scaling up duplicate detection in graph data
Duplicate detection determines different representations of realworld objects in a database. Recent research has considered the use of relationships among object representations t...
Melanie Herschel, Felix Naumann
USENIX
2008
15 years 1 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
BMVC
2001
15 years 1 months ago
A Buyer's Guide to Euclidean Elliptical Cylindrical and Conical Surface Fitting
The ability to construct CAD or other object models from edge and range data has a fundamental meaning in building a recognition and positioning system. While the problem of model...
Petko Faber, Robert B. Fisher
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
14 years 11 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....