Sciweavers

1311 search results - page 173 / 263
» Remarks on Hardware Implementation of Image Processing Algor...
Sort
View
ISSS
2000
IEEE
111views Hardware» more  ISSS 2000»
15 years 7 months ago
Systematic Data Reuse Exploration Methodology for Irregular Access Patterns
Efficient use of an optimized custom memory hierarchy to exploit temporal locality in the memory accesses on array signals can have a very large impact on the power consumption i...
Tanja Van Achteren, Rudy Lauwereins, Francky Catth...
153
Voted
MM
2005
ACM
141views Multimedia» more  MM 2005»
15 years 9 months ago
SEVA: sensor-enhanced video annotation
In this paper, we study how a sensor-rich world can be exploited by digital recording devices such as cameras and camcorders to improve a user’s ability to search through a larg...
Xiaotao Liu, Mark D. Corner, Prashant J. Shenoy
130
Voted
SAC
2004
ACM
15 years 8 months ago
Integrating similarity-based queries in image DBMSs
Until recently, issues in image retrieval have been handled in DBMSs and in computer vision as separate research works. Nowadays, the trend is towards integrating the two approach...
Solomon Atnafu, Richard Chbeir, David Coquil, Lion...
ICASSP
2009
IEEE
15 years 1 months ago
VLSI for 5000-word continuous speech recognition
We have developed a VLSI chip for 5,000 word speakerindependent continuous speech recognition. This chip employs a context-dependent HMM (hidden Markov model) based speech recogni...
Young-kyu Choi, Kisun You, Jungwook Choi, Wonyong ...
FPL
2003
Springer
130views Hardware» more  FPL 2003»
15 years 8 months ago
A Smith-Waterman Systolic Cell
With an aim to understand the information encoded by DNA sequences, databases containing large amount of DNA sequence information are frequently compared and searched for matching ...
Chi Wai Yu, K. H. Kwong, Kin-Hong Lee, Philip Heng...