Sciweavers

667 search results - page 36 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ASPLOS
2006
ACM
15 years 5 months ago
A performance counter architecture for computing accurate CPI components
Cycles per Instruction (CPI) stacks break down processor execution time into a baseline CPI plus a number of miss event CPI components. CPI breakdowns can be very helpful in gaini...
Stijn Eyerman, Lieven Eeckhout, Tejas Karkhanis, J...
ICIP
2004
IEEE
16 years 1 months ago
Data hiding using trellis coded quantization
Information theoretic tools lead to the design and analysis of new blind data hiding methods. A novel quantizationbased blind method, which uses trellis coded quantization, is pro...
Ersin Esen, A. Aydin Alatan
TABLETOP
2007
IEEE
15 years 6 months ago
Examination of Text-Entry Methods for Tabletop Displays
Although text entry is a vital part of day-to-day computing familiar to most people, not much research has been done to enable text entry on large interactive tables. One might as...
Uta Hinrichs, Mark S. Hancock, M. Sheelagh T. Carp...
ICCV
2009
IEEE
1556views Computer Vision» more  ICCV 2009»
16 years 4 months ago
Kernel Methods for Weakly Supervised Mean Shift Clustering
Mean shift clustering is a powerful unsupervised data analysis technique which does not require prior knowledge of the number of clusters, and does not constrain the shape of th...
Oncel Tuzel, Fatih Porikli, Peter Meer
ICML
2006
IEEE
16 years 18 days ago
Algorithms for portfolio management based on the Newton method
We experimentally study on-line investment algorithms first proposed by Agarwal and Hazan and extended by Hazan et al. which achieve almost the same wealth as the best constant-re...
Amit Agarwal, Elad Hazan, Satyen Kale, Robert E. S...