Sciweavers

1717 search results - page 306 / 344
» Error concealment using a diffusion based method
Sort
View
WEA
2010
Springer
250views Algorithms» more  WEA 2010»
15 years 2 months ago
Randomized Rounding for Routing and Covering Problems: Experiments and Improvements
We investigate how the recently developed different approaches to generate randomized roundings satisfying disjoint cardinality constraints behave when used in two classical algori...
Benjamin Doerr, Marvin Künnemann, Magnus Wahl...
WEBDB
2010
Springer
155views Database» more  WEBDB 2010»
15 years 2 months ago
Learning Topical Transition Probabilities in Click Through Data with Regression Models
The transition of search engine users’ intents has been studied for a long time. The knowledge of intent transition, once discovered, can yield a better understanding of how diļ...
Xiao Zhang, Prasenjit Mitra
ECCV
2010
Springer
15 years 2 months ago
Human Attributes from 3D Pose Tracking
We show that, from the output of a simple 3D human pose tracker one can infer physical attributes (e.g., gender and weight) and aspects of mental state (e.g., happiness or sadness)...
ISSRE
2002
IEEE
15 years 2 months ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...
MICRO
2000
IEEE
80views Hardware» more  MICRO 2000»
15 years 2 months ago
Silent stores for free
Silent store instructions write values that exactly match the values that are already stored at the memory address that is being written. A recent study reveals that significant ...
Kevin M. Lepak, Mikko H. Lipasti