Sciweavers

2131 search results - page 414 / 427
» Immunity for Closed Sets
Sort
View
TITB
1998
135views more  TITB 1998»
14 years 9 months ago
ViVa: the virtual vascular project
The aim of the ViVa project is to develop tools for the modern hemodynamicist and cardiovascular surgeon to study and interpret the constantly increasing amount of information bei...
Gassan Abdoulaev, Sandro Cadeddu, Giovanni Delussu...
TCAD
2002
104views more  TCAD 2002»
14 years 9 months ago
An instruction-level energy model for embedded VLIW architectures
In this paper, an instruction-level energy model is proposed for the data-path of very long instruction word (VLIW) pipelined processors that can be used to provide accurate power ...
Mariagiovanna Sami, Donatella Sciuto, Cristina Sil...
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 9 months ago
Maximum Bipartite Matching Size And Application to Cuckoo Hashing
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...
Josef Kanizo, David Hay, Isaac Keslassy
NN
2007
Springer
172views Neural Networks» more  NN 2007»
14 years 9 months ago
A computational neuroscience approach to consciousness
Simultaneous recordings from populations of neurons in the inferior temporal visual cortex show that most of the information about which stimulus was shown is available in the num...
Edmund T. Rolls
PR
2007
126views more  PR 2007»
14 years 9 months ago
Convex hull based skew estimation
Skew estimation and page segmentation are the two closely related processing stages for document image analysis. Skew estimation needs proper page segmentation, especially for doc...
Bo Yuan, Chew Lim Tan