Sciweavers

5934 search results - page 1146 / 1187
» Detecting a Network Failure
Sort
View

Publication
266views
14 years 5 months ago
NeuFlow: A Runtime Reconfigurable Dataflow Processor for Vision
In this paper we present a scalable dataflow hard- ware architecture optimized for the computation of general- purpose vision algorithms—neuFlow—and a dataflow compiler—luaFl...
C. Farabet, B. Martini, B. Corda, P. Akselrod, E. ...
ICASSP
2011
IEEE
14 years 3 months ago
3D image geo-registration using vision-based modeling
Image geo-registration is the process of relating a photograph and its pose to referenced world coordinates. The application is relevant, especially to the social networking, phot...
Karl Ni, Zachary Sun, Nadya Bliss
INFOCOM
2011
IEEE
14 years 3 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
JAISE
2011
179views more  JAISE 2011»
14 years 2 months ago
A hybrid probabilistic neural model for person tracking based on a ceiling-mounted camera
Person tracking is an important topic in ambient living systems as well as in computer vision. In particular, detecting a person from a ceiling-mounted camera is a challenge since ...
Wenjie Yan, Cornelius Weber, Stefan Wermter
NAR
2011
205views Computer Vision» more  NAR 2011»
14 years 2 months ago
The BRENDA Tissue Ontology (BTO): the first all-integrating ontology of all organisms for enzyme sources
BTO, the BRENDA Tissue Ontology (http://www .BTO.brenda-enzymes.org) represents a comprehensive structured encyclopedia of tissue terms. The project started in 2003 to create a co...
Marion Gremse, Antje Chang, Ida Schomburg, Andreas...
« Prev « First page 1146 / 1187 Last » Next »