Sciweavers

12943 search results - page 2250 / 2589
» Predicting When Not to Predict
Sort
View
169
Voted
JMM2
2006
218views more  JMM2 2006»
15 years 5 months ago
Automatic Recognition of Facial Actions in Spontaneous Expressions
Spontaneous facial expressions differ from posed expressions in both which muscles are moved, and in the dynamics of the movement. Advances in the field of automatic facial express...
Marian Stewart Bartlett, Gwen Littlewort, Mark G. ...
JMM2
2006
133views more  JMM2 2006»
15 years 5 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
MAM
2008
114views more  MAM 2008»
15 years 5 months ago
Asymmetrically banked value-aware register files for low-energy and high-performance
Designing high-performance low-energy register files is of critical importance to the continuation of current performance advances in wide-issue and deeply pipelined superscalar m...
Shuai Wang, Hongyan Yang, Jie S. Hu, Sotirios G. Z...
JPDC
2006
111views more  JPDC 2006»
15 years 5 months ago
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols
Irregular parallel algorithms pose a significant challenge for achieving high performance because of the difficulty predicting memory access patterns or execution paths. Within an...
Guojing Cong, David A. Bader
JSAC
2006
165views more  JSAC 2006»
15 years 5 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
« Prev « First page 2250 / 2589 Last » Next »