Results 11 - 20
of
4,804
Q: A Low Overhead High Performance Buffer Management Replacement Algorithm
"... In a path-breaking paper last year Pat and Betty O'Neil and Gerhard Weikum proposed a self-tuning improvement to the Least Recently Used (LRU) buffer management algorithm[15]. Their improvement is called LRU/k and advocates giving priority to buffer pages based on the kth most recent access. (T ..."
Abstract
-
Cited by 231 (2 self)
- Add to MetaCart
. (The standard LRU algorithm is denoted LRU/1 according to this terminology.) If P1's kth most recent access is more more recent than P2's, then P1 will be replaced after P2. Intuitively, LRU/k for k ? 1 is a good strategy, because it gives low priority to pages that have been scanned
Beam tracing polygonal objects
- In Computer Graphics (Proceedings of ACM SIGGRAPH
, 1984
"... Abstract Ray tracing has produced some of the most realistic computer generated pictures to date. They contain surface texturing, local shading, shadows, reflections and refractions. The major disadvantage of ray tracing results from its point-sampling approach. Because calculation proceeds ab init ..."
Abstract
-
Cited by 214 (1 self)
- Add to MetaCart
of the entire picture. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission
Object Detection Using the Statistics of Parts
, 2004
"... In this paper we describe a trainable object detector and its instantiations for detecting faces and cars at any size, location, and pose. To cope with variation in object orientation, the detector uses multiple classifiers, each spanning a different range of orientation. Each of these classifiers ..."
Abstract
-
Cited by 142 (2 self)
- Add to MetaCart
determines whether the object is present at a specified size within a fixed-size image window. To find the object at any location and size, these classifiers scan the image exhaustively. Each classifier is based on the statistics of localized parts. Each part is a transform from a subset of wavelet
Coil sensitivity encoding for fast MRI. In:
- Proceedings of the ISMRM 6th Annual Meeting,
, 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
complementary to Fourier preparation by linear field gradients. Thus, by using multiple receiver coils in parallel scan time in Fourier imaging can be considerably reduced. The problem of image reconstruction from sensitivity encoded data is formulated in a general fashion and solved for arbitrary coil
Visual images preserve metric spatial information: Evidence from studies of image scanning
- Journal of Experimental Psychology: Human Perception & Performance
, 1978
"... Four experiments demonstrated that more time is required to scan further distances across visual images, even when the same amount of material falls between the initial focus point and the target. Not only did times systematically increase with distance but subjectively larger images required more t ..."
Abstract
-
Cited by 120 (4 self)
- Add to MetaCart
's experiment also passed over more parts of the imaged object. For example, in scanning from the motor to the porthole of an imaged speedboat, a person passed over the rear deck and part of the cabin; in scanning from the motor to the more distant anchor, one scanned over all of these parts plus the front deck
A critical role for the right fronto-insular cortex in switching between central-executive and default-mode networks.
- Proc Natl Acad Sci USA
, 2008
"... Cognitively demanding tasks that evoke activation in the brain's central-executive network (CEN) have been consistently shown to evoke decreased activation (deactivation) in the default-mode network (DMN). The neural mechanisms underlying this switch between activation and deactivation of larg ..."
Abstract
-
Cited by 178 (1 self)
- Add to MetaCart
MRI) experiments to examine the interaction between the SN, CEN, and DMN, with particular interest in the role of the FIC/ACC in regulating these networks. In the first experiment, we scanned 18 participants as they listened with focused attention to classical music symphonies inside the scanner. We analyzed brain
Structural Saliency: The Detection of Globally Salient Structures Using a Locally Connected Network
, 1988
"... When we look at images, certain salient structures often attract our immediate attention, without requiring a systematic scan of the entire image. In subsequent stages, processing resources can be allocated preferentially to these salient structures. In many cases this saJiency is a property of the ..."
Abstract
-
Cited by 161 (1 self)
- Add to MetaCart
When we look at images, certain salient structures often attract our immediate attention, without requiring a systematic scan of the entire image. In subsequent stages, processing resources can be allocated preferentially to these salient structures. In many cases this saJiency is a property
Genome scan meta-analysis of schizophrenia and bipolar disorder, part II: Schizophrenia
- American Journal of Human Genetics
, 2003
"... This is the first of three articles on a meta-analysis of genome scans of schizophrenia (SCZ) and bipolar disorder (BPD) that uses the rank-based genome scan meta-analysis (GSMA) method. Here we used simulation to determine the power of GSMA to detect linkage and to identify thresholds of significan ..."
Abstract
-
Cited by 41 (6 self)
- Add to MetaCart
This is the first of three articles on a meta-analysis of genome scans of schizophrenia (SCZ) and bipolar disorder (BPD) that uses the rank-based genome scan meta-analysis (GSMA) method. Here we used simulation to determine the power of GSMA to detect linkage and to identify thresholds
Honeywell Scanning
"... Abstract — In this paper, we describe a reconfigurable antenna with switches on the antenna elements that are powered wirelessly, by the antenna itself. Control signals for individual switches are part of the antenna transmission. We describe the theory of operation and provide simulation results fo ..."
Abstract
- Add to MetaCart
Abstract — In this paper, we describe a reconfigurable antenna with switches on the antenna elements that are powered wirelessly, by the antenna itself. Control signals for individual switches are part of the antenna transmission. We describe the theory of operation and provide simulation results
Attentional Scanning
- In A. Cohn (Ed.), ECAI 94, 11th European Conference on Artificial Intelligence
, 1994
"... . A model for attentional scanning is constructed in the form of a gating network which consists of gating lattices. A gating lattice is a sparsely-connected neural network. The process of covert attention is interpreted as a biological solution to the problem of translation-invariant pattern proces ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
. A model for attentional scanning is constructed in the form of a gating network which consists of gating lattices. A gating lattice is a sparsely-connected neural network. The process of covert attention is interpreted as a biological solution to the problem of translation-invariant pattern
Results 11 - 20
of
4,804