Sciweavers

3135 search results - page 222 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
CLEAR
2007
Springer
296views Biometrics» more  CLEAR 2007»
15 years 10 months ago
PittPatt Face Detection and Tracking for the CLEAR 2007 Evaluation
Abstract. This paper describes Pittsburgh Pattern Recognition’s participation in the face detection and tracking tasks for the CLEAR 2007 evaluation. Since CLEAR 2006, we have ma...
Michael C. Nechyba, Louis Brandy, Henry Schneiderm...
MM
2009
ACM
252views Multimedia» more  MM 2009»
15 years 10 months ago
Localizing volumetric motion for action recognition in realistic videos
This paper presents a novel motion localization approach for recognizing actions and events in real videos. Examples include StandUp and Kiss in Hollywood movies. The challenge ca...
Xiao Wu, Chong-Wah Ngo, Jintao Li, Yongdong Zhang
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
15 years 10 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
MM
2006
ACM
152views Multimedia» more  MM 2006»
15 years 9 months ago
Local image representations using pruned salient points with applications to CBIR
Salient points are locations in an image where there is a significant variation with respect to a chosen image feature. Since the set of salient points in an image capture import...
Hui Zhang, Rouhollah Rahmani, Sharath R. Cholleti,...
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 7 months ago
Suffix tree construction algorithms on modern hardware
Suffix trees are indexing structures that enhance the performance of numerous string processing algorithms. In this paper, we propose cache-conscious suffix tree construction algo...
Dimitris Tsirogiannis, Nick Koudas