Sciweavers

2863 search results - page 228 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
HPDC
2008
IEEE
15 years 4 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
CDC
2010
IEEE
167views Control Systems» more  CDC 2010»
14 years 11 months ago
Numerical methods for the optimization of nonlinear stochastic delay systems, and an application to internet regulation
The Markov chain approximation method is an effective and widely used approach for computing optimal values and controls for stochastic systems. It was extended to nonlinear (and p...
Harold J. Kushner
135
Voted
ICPR
2008
IEEE
15 years 10 months ago
A corner strength based Fingerprint segmentation algorithm with dynamic thresholding
Segmentation is one of the first and most integral pre-processing steps for any Fingerprint Recognition System. It is used to identify the region of interest within an image. Perf...
Asim Baig, Ahmed Bouridane, Fatih Kurugollu
AVSS
2008
IEEE
15 years 4 months ago
Multi-view Access Monitoring and Singularization in Interlocks
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...
JCIT
2010
255views more  JCIT 2010»
14 years 10 months ago
Digital Watermarking Particle Swarm Optimization Based on Multi-wavelet
Watermark perceptibility and robustness must be ensured in order to enhance the practicality of digital watermarking. Taking human visual system characteristics into account fully...
Yinghui Pan