Sciweavers

1172 search results - page 172 / 235
» Using Small Screen Space More Efficiently
Sort
View
ECCV
2008
Springer
16 years 5 months ago
Face Alignment Via Component-Based Discriminative Search
In this paper, we propose a component-based discriminative approach for face alignment without requiring initialization1 . Unlike many approaches which locally optimize in a small ...
Lin Liang, Rong Xiao, Fang Wen, Jian Sun
113
Voted
RECOMB
2006
Springer
16 years 3 months ago
Phylogenetic Profiling of Insertions and Deletions in Vertebrate Genomes
Micro-indels are small insertion or deletion events (indels) that occur during genome evolution. The study of micro-indels is important, both in order to better understand the unde...
Sagi Snir, Lior Pachter
113
Voted
DATE
2009
IEEE
106views Hardware» more  DATE 2009»
15 years 10 months ago
Generation of compact test sets with high defect coverage
Abstract-Multi-detect (N-detect) testing suffers from the drawback that its test length grows linearly with N. We present a new method to generate compact test sets that provide hi...
Xrysovalantis Kavousianos, Krishnendu Chakrabarty
120
Voted
VLSID
1999
IEEE
100views VLSI» more  VLSID 1999»
15 years 7 months ago
Satisfiability-Based Detailed FPGA Routing
In this paper we address the problem of detailed FPGA routing using Boolean formulation methods. In the context of FPGA routing where routing resources are fixed, Boolean formulat...
Gi-Joon Nam, Karem A. Sakallah, Rob A. Rutenbar
131
Voted
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
15 years 7 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor