Sciweavers

4930 search results - page 951 / 986
» Testing a Safety-Critical Application
Sort
View
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
14 years 12 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
107
Voted
SIGMETRICS
2010
ACM
217views Hardware» more  SIGMETRICS 2010»
14 years 12 months ago
Optimal recovery of single disk failure in RDP code storage systems
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
14 years 12 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
ADHOC
2008
103views more  ADHOC 2008»
14 years 11 months ago
Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization
Energy efficiency and positional accuracy are often contradictive goals. We propose to decrease power consumption without sacrificing significant accuracy by developing an energy-...
Chuang-Wen You, Polly Huang, Hao-Hua Chu, Yi-Chao ...
AES
2008
Springer
133views Cryptology» more  AES 2008»
14 years 11 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar