Sciweavers

10909 search results - page 1917 / 2182
» Evaluating Backup Algorithms
Sort
View
HPCC
2011
Springer
14 years 4 months ago
Heuristic-Based Techniques for Mapping Irregular Communication Graphs to Mesh Topologies
— Mapping of parallel applications on the network topology is becoming increasingly important on large supercomputers. Topology aware mapping can reduce the hops traveled by mess...
Abhinav Bhatele, Laxmikant V. Kalé
IACR
2011
94views more  IACR 2011»
14 years 4 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
ICDAR
2011
IEEE
14 years 4 months ago
Chinese Keyword Spotting Using Knowledge-Based Clustering
—Content-based document image retrieval is a new and promising research area. Without OCR, document indexing directly based on image content is more general and convenient. Howev...
Yong Xia, Kuanquan Wang, Mingwei Li
ICDAR
2011
IEEE
14 years 4 months ago
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures
—Table detection is always an important task of document analysis and recognition. In this paper, we propose a novel and effective table detection method via visual separators an...
Jing Fang, Liangcai Gao, Kun Bai, Ruiheng Qiu, Xin...
ICDAR
2011
IEEE
14 years 4 months ago
Edge-Based Features for Localization of Artificial Urdu Text in Video Images
—Content-based video indexing and retrieval has become an interesting research area with the tremendous growth in the amount of digital media. In addition to the audio-visual con...
Akhtar Jamil, Imran Siddiqi, Fahim Arif, Ahsen Raz...
« Prev « First page 1917 / 2182 Last » Next »