Sciweavers

13336 search results - page 2490 / 2668
» Computer Vision: Algorithms and Applications
Sort
View
AVBPA
2005
Springer
226views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Discriminant Analysis Based on Kernelized Decision Boundary for Face Recognition
A novel nonlinear discriminant analysis method, Kernelized Decision Boundary Analysis (KDBA), is proposed in our paper, whose Decision Boundary feature vectors are the normal vecto...
Baochang Zhang, Xilin Chen, Wen Gao
ESOP
2005
Springer
15 years 9 months ago
Forward Slicing by Conjunctive Partial Deduction and Argument Filtering
Program slicing is a well-known methodology that aims at identifying the program statements that (potentially) affect the values computed at some point of interest. Within imperat...
Michael Leuschel, Germán Vidal
141
Voted
FPGA
2005
ACM
107views FPGA» more  FPGA 2005»
15 years 9 months ago
Instruction set extension with shadow registers for configurable processors
Configurable processors are becoming increasingly popular for modern embedded systems (especially for the field-programmable system-on-a-chip). While steady progress has been made...
Jason Cong, Yiping Fan, Guoling Han, Ashok Jaganna...
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
15 years 9 months ago
Morphing methods in evolutionary design optimization
Design optimization is a well established application field of evolutionary computation. However, standard recombination operators acting on the genotypic representation of the d...
Michael Nashvili, Markus Olhofer, Bernhard Sendhof...
IPOM
2005
Springer
15 years 9 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...
« Prev « First page 2490 / 2668 Last » Next »