Sciweavers

1050 search results - page 163 / 210
» Two methods of authenticated positioning
Sort
View
COLCOM
2009
IEEE
15 years 6 months ago
DiSK: A distributed shared disk cache for HPC environments
Abstract—Data movement within high performance environments can be a large bottleneck to the overall performance of programs. With the addition of continuous storage and usage of...
Brandon Szeliga, Tung Nguyen, Weisong Shi
EMMCVPR
2001
Springer
15 years 6 months ago
Grouping with Directed Relationships
Abstract. Grouping is a global partitioning process that integrates local cues distributed over the entire image. We identify four types of pairwise relationships, attraction and r...
Stella X. Yu, Jianbo Shi
116
Voted
VISUALIZATION
2000
IEEE
15 years 6 months ago
Image based rendering with stable frame rates
This paper presents an efficient keyframeless image-based rendering technique. An intermediate image is used to exploit the coherences among neighboring frames. The pixels in the...
Huamin Qu, Ming Wan, Jiafa Qin, Arie E. Kaufman
ICTAI
1999
IEEE
15 years 6 months ago
Face Detection and Its Applications in Intelligent and Focused Image Retrieval
This paper presents a face detection technique and its applications in image retrieval. Even though this face detection method has relatively high false positives and low detectio...
Zhongfei Zhang, Rohini K. Srihari, Aibing Rao
104
Voted
MICRO
2000
IEEE
95views Hardware» more  MICRO 2000»
15 years 5 months ago
Very low power pipelines using significance compression
Data, addresses, and instructions are compressed by maintaining only significant bytes with two or three extension bits appended to indicate the significant byte positions. This s...
Ramon Canal, Antonio González, James E. Smi...