Sciweavers

1523 search results - page 202 / 305
» Detecting and Sketching the Common
Sort
View
MOBISYS
2003
ACM
15 years 9 months ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...
ICCAD
2005
IEEE
83views Hardware» more  ICCAD 2005»
15 years 6 months ago
Post-placement rewiring and rebuffering by exhaustive search for functional symmetries
Separate optimizations of logic and layout have been thoroughly studied in the past and are well documented for common benchmarks. However, to be competitive, modern circuit optim...
Kai-Hui Chang, Igor L. Markov, Valeria Bertacco
CVPR
2010
IEEE
15 years 6 months ago
Visual Object Tracking using Adaptive Correlation Filters
Although not commonly used, correlation filters can track complex objects through rotations, occlusions and other distractions at over 20 times the rate of current state-ofthe-ar...
David Bolme, J Ross Beveridge, Bruce Draper, Yui M...
CHI
2010
ACM
15 years 4 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
EVOW
2010
Springer
15 years 4 months ago
Enhancing Genetic Algorithms by a Trie-Based Complete Solution Archive
Genetic algorithms (GAs) share a common weakness with most other metaheuristics: Candidate solutions are in general revisited multiple times, lowering diversity and wasting preciou...
Günther R. Raidl, Bin Hu