Sciweavers

1968 search results - page 295 / 394
» The Complexity of Valued Constraint Models
Sort
View
ICPR
2010
IEEE
14 years 7 months ago
Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks
This paper presents a cascaded scheme with block-based and pixel-based codebooks for background subtraction. The codebook is mainly used to compress information to achieve high ef...
Jing-Ming Guo, Chih-Sheng Hsu
TCAD
2010
168views more  TCAD 2010»
14 years 4 months ago
An MILP-Based Performance Analysis Technique for Non-Preemptive Multitasking MPSoC
For real-time applications, it is necessary to estimate the worst-case performance early in the design process without actual hardware implementation. While the non-preemptive task...
Hoeseok Yang, Sungchan Kim, Soonhoi Ha
HICSS
2012
IEEE
265views Biometrics» more  HICSS 2012»
13 years 5 months ago
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
David Tilson, Carsten Sørensen, Kalle Lyyti...
SIGCOMM
2012
ACM
13 years 11 days ago
AutoNetkit: simplifying large scale, open-source network experimentation
We present a methodology that brings simplicity to large and comt labs by using abstraction. The networking community has appreciated the value of large scale test labs to explore...
Simon Knight, Askar Jaboldinov, Olaf Maennel, Iain...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 3 months ago
Computational criticisms of the revelation principle
The revelation principle is a cornerstone tool in mechanism design. It states that one can restrict attention, without loss in the designer’s objective, to mechanisms in which A...
Vincent Conitzer, Tuomas Sandholm