Sciweavers

5675 search results - page 103 / 1135
» Exploiting Chaos for Computation
Sort
View
95
Voted
PERCOM
2007
ACM
16 years 11 days ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
94
Voted
SDM
2009
SIAM
105views Data Mining» more  SDM 2009»
15 years 10 months ago
Exploiting Semantic Constraints for Estimating Supersenses with CRFs.
The annotation of words and phrases by ontology concepts is extremely helpful for semantic interpretation. However many ontologies, e.g. WordNet, are too fine-grained and even hu...
Gerhard Paaß, Frank Reichartz
89
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Exploiting statically schedulable regions in dataflow programs
Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP) applications, such as multi-media processing, and wireless communications. Among various f...
Ruirui Gu, Jörn W. Janneck, Mickaël Raul...
CIVR
2009
Springer
169views Image Analysis» more  CIVR 2009»
15 years 7 months ago
Exploiting contextual data for event retrieval in surveillance video
Contextual information is vital for the robust extraction of semantic information in automated surveillance systems. We have developed a scene independent framework for the detect...
Philip Kelly, Ciarán O. Conaire, Noel E. O'...
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
15 years 7 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl