• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,670
Next 10 →

The Laplacian Pyramid as a Compact Image Code

by Peter J. Burt , Edward H. Adelson , 1983
"... We describe a technique for image encoding in which local operators of many scales but identical shape serve as the basis functions. The representation differs from established techniques in that the code elements are localized in spatial frequency as well as in space. Pixel-to-pixel correlations a ..."
Abstract - Cited by 1388 (12 self) - Add to MetaCart
are first removed by subtracting a lowpass filtered copy of the image from the image itself. The result is a net data compression since the difference, or error, image has low variance and entropy, and the low-pass filtered image may represented at reduced sample density. Further data compression

The Cache Performance and Optimizations of Blocked Algorithms

by Monica S. Lam, Edward E. Rothberg, Michael E. Wolf - In Proceedings of the Fourth International Conference on Architectural Support for Programming Languages and Operating Systems , 1991
"... Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused. This ..."
Abstract - Cited by 574 (5 self) - Add to MetaCart
is highly sensitive to the stride of data accesses and the size of the blocks, and can cause wide variations in machine performance for different matrix sizes. The conventional wisdom of trying to use the entire cache, or even a fixed fraction of the cache, is incorrect. If a fixed block size is used for a

Graphcut textures: Image and video synthesis using graph cuts

by Vivek Kwatra, Arno Schödl, Irfan Essa, Greg Turk, Aaron Bobick - ACM Transactions on Graphics, SIGGRAPH 2003 , 2003
"... This banner was generated by merging the source images in Figure 6 using our interactive texture merging technique. In this paper we introduce a new algorithm for image and video texture synthesis. In our approach, patch regions from a sample image or video are transformed and copied to the output a ..."
Abstract - Cited by 490 (9 self) - Add to MetaCart
This banner was generated by merging the source images in Figure 6 using our interactive texture merging technique. In this paper we introduce a new algorithm for image and video texture synthesis. In our approach, patch regions from a sample image or video are transformed and copied to the output

Real-time quantification of microRNAs by stem-loop RT-PCR

by Caifu Chen, Dana A. Ridzon, Adam J. Broomer, Zhaohui Zhou, Danny H. Lee, Julie T. Nguyen, Maura Barbisin, Nan Lan Xu, Vikram R. Mahuvakar, Mark R. Andersen, Kai Qin Lao, Kenneth J. Livak, Karl J. Guegler - Nucleic Acids Res , 2005
"... A novel microRNA (miRNA) quantification method has been developed using stem–loop RT followed by TaqMan PCR analysis. Stem–loop RT primers are better than conventional ones in terms of RT efficiency and specificity. TaqMan miRNA assays are specific for mature miRNAs and discriminate among related mi ..."
Abstract - Cited by 394 (8 self) - Add to MetaCart
miRNAs that differ by as little as one nucleotide. Furthermore, they are not affected by genomic DNA contamination. Precise quantification is achieved routinely with as little as 25 pg of total RNA for most miRNAs. In fact, the high sensitivity, specificity and precision of this method allows

Collusion-Secure Fingerprinting for Digital Data

by Dan Boneh, James Shaw - IEEE Transactions on Information Theory , 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract - Cited by 353 (1 self) - Add to MetaCart
and trace it back to the user. This threat of detection will hopefully deter users from releasing unauthorized copies. A problem arises when users collude: For digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude

A framework for clustering evolving data streams. In:

by Charu C Aggarwal , T J Watson , Resch Jiawei Ctr , Jianyong Han , Wang , Philip Yu , T J Watson , Resch Ctr - Proc of VLDB’03, , 2003
"... Abstract The clustering problem is a difficult problem for the data stream domain. This is because the large volumes of data arriving in a stream renders most traditional algorithms too inefficient. In recent years, a few one-pass clustering algorithms have been developed for the data stream proble ..."
Abstract - Cited by 359 (36 self) - Add to MetaCart
algorithm requires much greater functionality in discovering and exploring clusters over different portions of the stream. The widely used practice of viewing data stream clustering algorithms as a class of onepass clustering algorithms is not very useful from an application point of view. For example, a

File System Design for an NFS File Server Appliance

by Dave Hitz, James Lau, Michael Malcolm , 1994
"... Network Appliance recently began shipping a new kind of network server called an NFS file server appliance, which is a dedicated server whose sole function is to provide NFS file service. The file system requirements for an NFS appliance are different from those for a general-purpose UNIX system, b ..."
Abstract - Cited by 338 (2 self) - Add to MetaCart
Network Appliance recently began shipping a new kind of network server called an NFS file server appliance, which is a dedicated server whose sole function is to provide NFS file service. The file system requirements for an NFS appliance are different from those for a general-purpose UNIX system

Escape analysis for Java

by Jong-deok Choi, Mannish Gupta, Mauricio Serrano, Vugranam C. Sreedhar, Sam Midkiff - OOPSLA , 1999
"... This paper presents a simple and efficient data flow algorithm for escape analysis of objects in Java programs to determine (i) if an object can be allocated on the stack; (ii) if an object is accessed only by a single thread duriing its lifetime, so that synchronization operations on that object ca ..."
Abstract - Cited by 300 (12 self) - Add to MetaCart
be used effectively in different calling contexts. We present an interprocedural al-gorithm that uses the above property to efficiently compute the connection graph and identify the non-escaping objects for methods and threads. The experimental results, from a proto-type implementation of our framework

Governance Matters III: Governance Indicators for 1996–2002.” Policy Research Working Paper 3106

by Daniel Kaufmann, Aart Kraay, Massimo Mastruzzi , 2003
"... Kaufmann, Kraay, and Mastruzzi present estimates of six aggregate governance indicators in each of the four dimensions of governance covering 199 countries and periods. They present the point estimates of the territories for four time periods: 1996, 1998, 2000, and dimensions of governance as well a ..."
Abstract - Cited by 298 (1 self) - Add to MetaCart
on indicators constructed by 18 different organizations. The authors initiated in 1998 (Kaufmann, Kraay, and Zoido-Lobat6n assign these individual measures of governance to 1999a,b and 2002). The authors also address various categories capturing key dimensions of governance and methodological issues, including

Routing in Ad-Hoc Networks Using Minimum Connected Dominating Sets

by Bevan Das, Vaduvur Bharghavan , 1997
"... this paper, we impose a virtual backbone structure on the ad-hoc network, in order to support unicast, multicast, and fault-tolerant routing within the ad-hoc network. This virtual backbone differs from the wired backbone of cellular networks in two key ways: (a) it may change as nodes move, and (b) ..."
Abstract - Cited by 297 (3 self) - Add to MetaCart
this paper, we impose a virtual backbone structure on the ad-hoc network, in order to support unicast, multicast, and fault-tolerant routing within the ad-hoc network. This virtual backbone differs from the wired backbone of cellular networks in two key ways: (a) it may change as nodes move, and (b
Next 10 →
Results 1 - 10 of 8,670
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University