Sciweavers

1199 search results - page 74 / 240
» How to Compare the Power of Computational Models
Sort
View
ISLPED
2007
ACM
169views Hardware» more  ISLPED 2007»
15 years 1 months ago
Throughput of multi-core processors under thermal constraints
We analyze the effect of thermal constraints on the performance and power of multi-core processors. We propose system-level power and thermal models, and derive expressions for (a...
Ravishankar Rao, Sarma B. K. Vrudhula, Chaitali Ch...
CGF
1999
91views more  CGF 1999»
14 years 11 months ago
Compact Metallic Reflectance Models
The paper presents simple, physically plausible, but not physically based reflectance models for metals and other specular materials. So far there has been no metallic BRDF model ...
László Neumann, Attila Neumann, L&aa...
CVPR
2009
IEEE
16 years 7 months ago
Locally Time-Invariant models of Human Activities using Trajectories on the Grassmanian
Human activity analysis is an important problem in computer vision with applications in surveillance and summarization and indexing of consumer content. Complex human activities...
Pavan Turaga, Rama Chellappa
AAAI
2007
15 years 2 months ago
Learning Graphical Model Structure Using L1-Regularization Paths
Sparsity-promoting L1-regularization has recently been succesfully used to learn the structure of undirected graphical models. In this paper, we apply this technique to learn the ...
Mark W. Schmidt, Alexandru Niculescu-Mizil, Kevin ...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 12 days ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay