Sciweavers

977 search results - page 94 / 196
» Soft Constraints for Security
Sort
View
CVPR
2008
IEEE
16 years 3 months ago
Markerless motion capture of man-machine interaction
This work deals with modeling and markerless tracking of athletes interacting with sports gear. In contrast to classical markerless tracking, the interaction with sports gear come...
Bodo Rosenhahn, Christian Schmaltz, Thomas Brox, J...
IPPS
2006
IEEE
15 years 7 months ago
Analysis of a reconfigurable network processor
In this paper an analysis of a dynamically reconfigurable processor is presented. The network processor incorporates a processor and a number of coprocessors that can be connected...
Christopher Kachris, Stamatis Vassiliadis
100
Voted
IPPS
2006
IEEE
15 years 7 months ago
Automatic application-specific microarchitecture reconfiguration
Applications for constrained embedded systems are subject to strict time constraints and restrictive resource utilization. With soft core processors, application developers can cu...
Shobana Padmanabhan, Ron K. Cytron, Roger D. Chamb...
ICDCS
2005
IEEE
15 years 7 months ago
Resilient Localization for Sensor Networks in Outdoor Environments
The process of computing the physical locations of nodes in a wireless sensor network is known as localization. Selflocalization is critical for large-scale sensor networks becaus...
YoungMin Kwon, Kirill Mechitov, Sameer Sundresh, W...
102
Voted
SPIN
2005
Springer
15 years 7 months ago
Repairing Structurally Complex Data
We present a novel algorithm for repairing structurally complex data. Given an assertion that represents desired structural integrity constraints and a structure that violates them...
Sarfraz Khurshid, Iván García, Yuk L...