Sciweavers

2449 search results - page 300 / 490
» Tensor Embedding Methods
Sort
View
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
15 years 5 months ago
A Radical Approach to Network-on-Chip Operating Systems
Operating systems were created to provide multiple tasks with access to scarce hardware resources like CPU, memory, or storage. Modern programmable hardware, however, may contain ...
Michael Engel, Olaf Spinczyk
RTAS
2009
IEEE
15 years 5 months ago
On Time-Aware Instrumentation of Programs
—Software instrumentation is a key technique in many stages of the development process. It is of particular importance for debugging embedded systems. Instrumented programs produ...
Sebastian Fischmeister, Patrick Lam
SAMOS
2009
Springer
15 years 5 months ago
Experiences with Cell-BE and GPU for Tomography
Tomography is a powerful technique for three-dimensional imaging, that deals with image reconstruction from a series of projection images, acquired along a range of viewing directi...
Sander van der Maar, Kees Joost Batenburg, Jan Sij...
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 5 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
CIDM
2007
IEEE
15 years 5 months ago
Mining Subspace Correlations
— In recent applications of clustering such as gene expression microarray analysis, collaborative filtering, and web mining, object similarity is no longer measured by physical ...
Rave Harpaz, Robert M. Haralick