Sciweavers

4469 search results - page 666 / 894
» Comparing and Combining Profiles
Sort
View
ICASSP
2010
IEEE
15 years 4 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
ICDE
2010
IEEE
200views Database» more  ICDE 2010»
15 years 4 months ago
Towards better entity resolution techniques for Web document collections
— As person names are non-unique, the same name on different Web pages might or might not refer to the same real-world person. This entity identification problem is one of the m...
Surender Reddy Yerva, Zoltán Miklós,...
EUROPAR
2010
Springer
15 years 4 months ago
Power-Efficient Spilling Techniques for Chip Multiprocessors
Abstract. Current trends in CMPs indicate that the core count will increase in the near future. One of the main performance limiters of these forthcoming microarchitectures is the ...
Enric Herrero, José González, Ramon ...
ICPR
2010
IEEE
15 years 4 months ago
Decision Fusion for Patch-Based Face Recognition
—Patch-based face recognition is a recent method which uses the idea of analyzing face images locally, in order to reduce the effects of illumination changes and partial occlusio...
Berkay Topcu, Hakan Erdogan
ICPR
2010
IEEE
15 years 4 months ago
Robust Gait Recognition Against Speed Variation
—Variations in walking speed have a strong impact on the recognition of gait. We propose a method of recognition of gait that is robust against walking-speed variations. It is es...
Muhammad Rasyid Aqmar, Koichi Shinoda, Sadaoki Fur...