Sciweavers

1720 search results - page 193 / 344
» Evaluation of a High Performance Code Compression Method
Sort
View
142
Voted
PAMI
2010
265views more  PAMI 2010»
15 years 2 months ago
Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories
—In this paper, we study the problem of segmenting tracked feature point trajectories of multiple moving objects in an image sequence. Using the affine camera model, this proble...
Shankar Rao, Roberto Tron, René Vidal, Yi M...
155
Voted
CGO
2007
IEEE
15 years 7 months ago
Shadow Profiling: Hiding Instrumentation Costs with Parallelism
In profiling, a tradeoff exists between information and overhead. For example, hardware-sampling profilers incur negligible overhead, but the information they collect is consequen...
Tipp Moseley, Alex Shye, Vijay Janapa Reddi, Dirk ...
146
Voted
MTA
2011
260views Hardware» more  MTA 2011»
14 years 10 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
147
Voted
HPCA
1997
IEEE
15 years 8 months ago
Architectural Support for Compiler-Synthesized Dynamic Branch Prediction Strategies: Rationale and Initial Results
This paper introduces a new architectural approach that supports compiler-synthesized dynamic branch predication. In compiler-synthesized dynamic branch prediction, the compiler g...
David I. August, Daniel A. Connors, John C. Gyllen...
142
Voted
CODES
2003
IEEE
15 years 9 months ago
RTOS scheduling in transaction level models
the level of abstraction in system design promises to enable faster exploration of the design space at early stages. While scheduling decision for embedded software has great impa...
Haobo Yu, Andreas Gerstlauer, Daniel Gajski