Sciweavers

1474 search results - page 145 / 295
» Exploiting Locality in a TMS
Sort
View
FGR
1996
IEEE
141views Biometrics» more  FGR 1996»
15 years 8 months ago
Detection of human faces under scale, orientation and viewpoint variations
Many current human face detection algorithmsmake implicit assumptions about the scale, orientation or viewpoint of faces in an image and exploit these constraints to detect and lo...
Kin Choong Yow, Roberto Cipolla
MICRO
1996
IEEE
81views Hardware» more  MICRO 1996»
15 years 8 months ago
Instruction Scheduling and Executable Editing
Modern microprocessors offer more instruction-level parallelism than most programs and compilers can currently exploit. The resulting disparity between a machine's peak and a...
Eric Schnarr, James R. Larus
CONPAR
1994
15 years 8 months ago
The Rewrite Rule Machine Node Architecture and Its Performance
The Rewrite Rule Machine (RRM) is a massively parallel MIMD/SIMD computer designed with the explicit purpose of supporting veryhigh-level parallel programming with rewrite rules. T...
Patrick Lincoln, José Meseguer, Livio Ricci...
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
15 years 8 months ago
Adaptive evolution: an efficient heuristic for global optimization
This paper presents a novel evolutionary approach to solve numerical optimization problems, called Adaptive Evolution (AEv). AEv is a new micro-population-like technique because i...
Francisco Viveros Jiménez, Efrén Mez...
ICASSP
2009
IEEE
15 years 8 months ago
Principal component analysis in decomposable Gaussian graphical models
We consider principal component analysis (PCA) in decomposable Gaussian graphical models. We exploit the prior information in these models in order to distribute its computation. ...
Ami Wiesel, Alfred O. Hero III