Sciweavers

1566 search results - page 205 / 314
» Contification Using Dominators
Sort
View
103
Voted
CEC
2007
IEEE
15 years 8 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 8 months ago
Language Networks on LiveJournal
Language use in 1,000 randomly-selected and 5,025 crawled LiveJournals was analyzed in order to determine the overall language demographics, the robustness of four non-English lan...
Susan C. Herring, John C. Paolillo, Irene Ramos-Vi...
ICIP
2007
IEEE
15 years 8 months ago
The Optimal ROS-Based Symmetric Phase-Only Filter for Fingerprint Verification
Symmetric phase-only filter (SPOF) has been widely applied to image registration and recognition, and has been proved efficient for fingerprint verification. Fingerprint images ha...
Xin Shuai, Chao Zhang, Pengwei Hao
ISCAS
2007
IEEE
222views Hardware» more  ISCAS 2007»
15 years 8 months ago
A Greedy Common Subexpression Elimination Algorithm for Implementing FIR Filters
— The complexity of Finite Impulse Response (FIR) filters is dominated by the number of adders (subtractors) used to implement the coefficient multipliers. A greedy Common Subexp...
S. Vijay, A. Prasad Vinod, Edmund Ming-Kit Lai
ISCAS
2007
IEEE
112views Hardware» more  ISCAS 2007»
15 years 8 months ago
A New Statistical Approach for Glitch Estimation in Combinational Circuits
— Low-power consumption has become a highly important concern for synchronous standard-cell design, and consequently mandates the use of low-power design methodologies and techni...
Ahmed Sayed, Hussain Al-Asaad