Sciweavers

2639 search results - page 119 / 528
» Pen Computing: Challenges and Applications
Sort
View
JSA
2007
123views more  JSA 2007»
14 years 9 months ago
Application of deterministic and stochastic Petri-Nets for performance modeling of NoC architectures
The design of appropriate communication architectures for complex Systems-on-Chip (SoC) is a challenging task. One promising alternative to solve these problems are Networks-on-Ch...
Holger Blume, Thorsten von Sydow, Daniel Becker, T...
AUSDM
2007
Springer
140views Data Mining» more  AUSDM 2007»
15 years 4 months ago
The application of data mining techniques to characterize agricultural soil profiles
The advances in computing and information storage have provided vast amounts of data. The challenge has been to extract knowledge from this raw data; this has lead to new methods ...
Leisa Armstrong, Dean Diepeveen, Rowan Maddern
DAGM
2007
Springer
15 years 4 months ago
Learning Robust Objective Functions with Application to Face Model Fitting
Abstract. Model-based image interpretation extracts high-level information from images using a priori knowledge about the object of interest. The computational challenge is to dete...
Matthias Wimmer, Sylvia Pietzsch, Freek Stulp, Ber...
SLSFS
2005
Springer
15 years 3 months ago
Incorporating Constraints and Prior Knowledge into Factorization Algorithms - An Application to 3D Recovery
Abstract. Matrix factorization is a fundamental building block in many computer vision and machine learning algorithms. In this work we focus on the problem of ”structure from mo...
Amit Gruber, Yair Weiss
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
14 years 12 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke