Sciweavers

2006 search results - page 265 / 402
» Heuristic Security-Testing Methods
Sort
View
116
Voted
ICCAD
2002
IEEE
152views Hardware» more  ICCAD 2002»
15 years 9 months ago
Efficient instruction encoding for automatic instruction set design of configurable ASIPs
Application-specific instructions can significantly improve the performance, energy, and code size of configurable processors. A common approach used in the design of such instruc...
Jong-eun Lee, Kiyoung Choi, Nikil Dutt
127
Voted
CVPR
2010
IEEE
15 years 9 months ago
The Cluttered Background Problem for Active Contours: A Minimum-Latency Solution
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedd...
Stefano Soatto, Ganesh Sundaramoorthi, Anthony Yez...
103
Voted
SAC
2010
ACM
15 years 7 months ago
MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning
This article addresses the problem of efficient multi-robot patrolling in a known environment. The proposed approach assigns regions to each mobile agent. Every region is represen...
David Portugal, Rui Rocha
GLOBECOM
2009
IEEE
15 years 7 months ago
Channel Orthogonalizing Precoder for Open-Loop QO-STBC Systems
—This paper proposes a new preprocessing scheme for rate-one quasi-orthogonal space-time block code (QO-STBC), which requires no channel state information at the transmitter. We ...
Heejin Kim, Heunchul Lee, Inkyu Lee
79
Voted
ICASSP
2009
IEEE
15 years 7 months ago
A game-theoretic framework for multi-user multimedia rate allocation
How to efficiently and fairly allocate data rate among different users is a key problem in the field of multiuser multimedia communication. However, most of the existing optimiz...
Yan Chen, Beibei Wang, K. J. Ray Liu