Sciweavers

7200 search results - page 1145 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
ICDM
2006
IEEE
154views Data Mining» more  ICDM 2006»
15 years 7 months ago
Mining and Predicting Duplication over Peer-to-Peer Query Streams
Many previous works of data mining user queries in Peer-to-Peer systems focused their attention on the distribution of query contents. However, few has been done towards a better ...
Shicong Meng, Yifeng Shao, Cong Shi, Dingyi Han, Y...
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Collaborative Multithreading: An Open Scalable Processor Architecture for Embedded Multimedia Applications
Numerous approaches can be employed in exploiting computation power in processors such as superscalar, VLIW, SMT and multi-core on chip. In this paper, a UniCore VisoMT processor ...
Wei-Chun Ku, Shu-Hsuan Chou, Jui-Chin Chu, Chih-He...
ICPADS
2006
IEEE
15 years 7 months ago
On the Effects of Consistency in Data Operations in Wireless Sensor Networks
In battery powered systems such as wireless sensor networks, energy efficiency is one of the most important system design goals. In this paper, energy efficiency is examined fro...
Kewei Sha, Weisong Shi
IISWC
2006
IEEE
15 years 7 months ago
Performance Cloning: A Technique for Disseminating Proprietary Applications as Benchmarks
Many embedded real world applications are intellectual property, and vendors hesitate to share these proprietary applications with computer architects and designers. This poses a ...
Ajay Joshi, Lieven Eeckhout, Robert H. Bell Jr., L...
« Prev « First page 1145 / 1440 Last » Next »