Sciweavers

1240 search results - page 150 / 248
» Composition with Target Constraints
Sort
View
ICPR
2004
IEEE
15 years 11 months ago
Incorporating Prior Knowledge into SVM for Image Retrieval
SVM based image retrieval suffers from the scarcity of labelled samples. In this paper, this problem is solved by incorporating prior knowledge into SVM. Firstly, some prior knowl...
Lei Wang, Ping Xue, Kap Luk Chan
CHI
2003
ACM
15 years 10 months ago
Refining Fitts' law models for bivariate pointing
We investigate bivariate pointing in light of the recent progress in the modeling of univariate pointing. Unlike previous studies, we focus on the effect of target shape (width an...
Johnny Accot, Shumin Zhai
ICCD
2008
IEEE
109views Hardware» more  ICCD 2008»
15 years 6 months ago
Suitable cache organizations for a novel biomedical implant processor
— This paper evaluates various instruction- and data-cache organizations in terms of performance, power, energy and area on a suitably selected biomedical benchmark suite. The be...
Christos Strydis
ICCAD
2005
IEEE
93views Hardware» more  ICCAD 2005»
15 years 6 months ago
Eliminating wire crossings for molecular quantum-dot cellular automata implementation
— When exploring computing elements made from technologies other than CMOS, it is imperative to investigate the effects of physical implementation constraints. This paper focuses...
Amitabh Chaudhary, Danny Z. Chen, Kevin Whitton, M...
ESORICS
2009
Springer
15 years 4 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...