Sciweavers

8503 search results - page 1322 / 1701
» Secure Software Architectures
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 8 months ago
Design Experience of a Chip Multiprocessor Merlot and Expectation to Functional Verification
We have fabricated a Chip Multiprocessor prototype code-named Merlot to proof our novel speculative multithreading architecture. On Merlot, multiple threads provide wider issue wi...
Satoshi Matsushita
135
Voted
FPL
2009
Springer
156views Hardware» more  FPL 2009»
15 years 8 months ago
A highly scalable Restricted Boltzmann Machine FPGA implementation
Restricted Boltzmann Machines (RBMs) — the building block for newly popular Deep Belief Networks (DBNs) — are a promising new tool for machine learning practitioners. However,...
Sang Kyun Kim, Lawrence C. McAfee, Peter L. McMaho...
120
Voted
CIKM
2001
Springer
15 years 8 months ago
The Enosys Markets Data Integration Platform: Lessons from the Trenches
Enosys Markets offers a state-of-the-art data integration software platform to support the development of the next generation of eBusiness applications that deliver value by provi...
Yannis Papakonstantinou, Vasilis Vassalos
ICVS
2001
Springer
15 years 8 months ago
A Framework for Generic State Estimation in Computer Vision Applications
Abstract. Experimenting and building integrated, operational systems in computational vision poses both theoretical and practical challenges, involving methodologies from control t...
Cristian Sminchisescu, Alexandru Telea
126
Voted
CAMP
2000
IEEE
15 years 8 months ago
Homography Based Parallel Volume Intersection: Toward Real-Time Volume Reconstruction using Active Cameras
Silhouette volume intersection is one of the most popular ideas for reconstructing the 3D volume of an object from multi-viewpoint silhouette images. This paper presents a novel p...
Toshikazu Wada, Xiaojun Wu, Shogo Tokai, Takashi M...
« Prev « First page 1322 / 1701 Last » Next »