Sciweavers

2542 search results - page 441 / 509
» One step ahead
Sort
View
CVPR
2010
IEEE
15 years 4 months ago
Weakly-Supervised Hashing in Kernel Space
The explosive growth of the vision data motivates the recent studies on efficient data indexing methods such as locality-sensitive hashing (LSH). Most existing approaches perform...
Yadong Mu, Jialie Shen, Shuicheng Yan
DATE
2005
IEEE
152views Hardware» more  DATE 2005»
15 years 4 months ago
Design of Fault-Tolerant and Dynamically-Reconfigurable Microfluidic Biochips
Technology Roadmap for Semiconductors (ITRS) clearly identifies the integration of electrochemical and electrobiological techniques as one of the system-level design challenges tha...
Fei Su, Krishnendu Chakrabarty
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
15 years 4 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...
GLVLSI
2005
IEEE
99views VLSI» more  GLVLSI 2005»
15 years 4 months ago
An empirical study of crosstalk in VDSM technologies
We perform a detailed study of various crosstalk scenarios in VDSM technologies by using a distributed model of the crosstalk site and make a number of key observations about the ...
Shahin Nazarian, Massoud Pedram, Emre Tuncer
ICCV
2005
IEEE
15 years 4 months ago
Mutual Information-Based 3D Surface Matching with Applications to Face Recognition and Brain Mapping
Face recognition and many medical imaging applications require the computation of dense correspondence vector fields that match one surface with another. In brain imaging, surfac...
Yalin Wang, Ming-Chang Chiang, Paul M. Thompson