Sciweavers

68 search results - page 8 / 14
» Recursive adaptive computations using perobject visitors
Sort
View
82
Voted
CGO
2009
IEEE
15 years 4 months ago
Computer Generation of General Size Linear Transform Libraries
The development of high-performance libraries has become extraordinarily difficult due to multiple processor cores, vector instruction sets, and deep memory hierarchies. Often, t...
Yevgen Voronenko, Frédéric de Mesmay...
ISBI
2008
IEEE
15 years 10 months ago
RLS-grappa: Reconstructing parallel MRI data with adaptive filters
GRAPPA is one of the predominant methods used to reconstruct accelerated parallel MRI data. In has been shown previously that spatially varying the GRAPPA reconstruction coefficie...
William Scott Hoge, Fernando Gallego, Zhikui Xiao,...
ICCV
2007
IEEE
15 years 11 months ago
Multiscale Edge Detection and Fiber Enhancement Using Differences of Oriented Means
We present an algorithm for edge detection suitable for both natural as well as noisy images. Our method is based on efficient multiscale utilization of elongated filters measurin...
Meirav Galun, Ronen Basri, Achi Brandt
ICCV
2009
IEEE
16 years 2 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
87
Voted
NSDI
2008
14 years 12 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen