Sciweavers

12841 search results - page 2526 / 2569
» PL-detective: experiences and results
Sort
View
93
Voted
ICIP
2010
IEEE
14 years 10 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
ICIP
2010
IEEE
14 years 10 months ago
Motion-blur-free exposure fusion
We present a novel approach to HDR (high-dynamic-range) image fusion that copes with image blur degradation often present in longexposed images. The proposed approach can deal wit...
Marius Tico, Natasha Gelfand, Kari Pulli
ICTAI
2010
IEEE
14 years 10 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
IMC
2010
ACM
14 years 10 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
IPPS
2010
IEEE
14 years 10 months ago
KRASH: Reproducible CPU load generation on many-core machines
Abstract--In this article we present KRASH, a tool for reproducible generation of system-level CPU load. This tool is intended for use in shared memory machines equipped with multi...
Swann Perarnau, Guillaume Huard
« Prev « First page 2526 / 2569 Last » Next »