Results 1 - 10
of
763
Research and Reviews: Journal of Engineering and Technology Multi-Scale Recognition of Objects Approach based on Inherent Redundancy Information Entropy Equalization
"... ABSTRACT Development of new imaging sensors arise the need for image processing techniques that can effectively fuse images from different sensors into a single coherent composition for interpretation. In order to make use of inherent redundancy and extended coverage of multiple sensors, we propose ..."
Abstract
- Add to MetaCart
ABSTRACT Development of new imaging sensors arise the need for image processing techniques that can effectively fuse images from different sensors into a single coherent composition for interpretation. In order to make use of inherent redundancy and extended coverage of multiple sensors, we
Securing ad hoc networks
"... Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operation ..."
Abstract
-
Cited by 1064 (15 self)
- Add to MetaCart
network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between
Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression
, 1988
"... A three-layered neural network is described for transforming two-dimensional discrete signals into generalized nonorthogonal 2-D “Gabor” representations for image analysis, segmentation, and compression. These transforms are conjoint spatial/spectral representations [lo], [15], which provide a comp ..."
Abstract
-
Cited by 478 (8 self)
- Add to MetaCart
complete image description in terms of locally windowed 2-D spectral coordinates embedded within global 2-D spatial coordinates. Because intrinsic redundancies within images are extracted, the resulting image codes can be very compact. However, these conjoint transforms are inherently difficult to compute
Redundant
"... Abstract. A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problems is exploited by applying an implicit redundant representation (IRR) genetic algorithm. The unbraced frame st ..."
Abstract
- Add to MetaCart
Abstract. A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problems is exploited by applying an implicit redundant representation (IRR) genetic algorithm. The unbraced frame
Exploiting Inherent Program Redundancy for Fault Tolerance
, 2009
"... Technology scaling has led to growing concerns about reliability in micro-processors. Currently, fault tolerance studies rely on creating explicitly redundant execution for fault detection or recovery, which usually involves expensive cost on performance, power, or hardware, etc. In our study, we fi ..."
Abstract
- Add to MetaCart
find exploiting program’s inherent redundancy can better trade off between reliability, performance, and hard-ware cost. This work proposes two approaches to enhance program reliability. The first approach investigates the additional fault resilience at the application level. We explore program
Exploiting Microarchitectural Redundancy for Defect Tolerance
- the 21st International Conference on Computer Design (ICCD
, 2003
"... Continued advancements in fabrication technology and reductions in feature size create challenges in maintaining both manufacturing yield rates and long-term reliability of devices. Methods based on defect detection and reduction may not offer a scalable solution due to cost of eliminating contamina ..."
Abstract
-
Cited by 59 (4 self)
- Add to MetaCart
contaminants in the manufacturing process and increasing chip complexity. This paper proposes to use the inherent redundancy available in existing and future chip microarchitectures to improve yield and enable graceful performance degradation in fail-in-place systems. We introduce a new yield metric called
Protecting Free Expression Online with Freenet
, 2002
"... ially hundreds of thousands of desktop computers to create a collaborative virtual file system. To increase network robustness and eliminate single points of failure, Freenet employs a completely decentralized architecture. Given that the P2P environment is inherently untrustworthy and unreliable, w ..."
Abstract
-
Cited by 211 (7 self)
- Add to MetaCart
ially hundreds of thousands of desktop computers to create a collaborative virtual file system. To increase network robustness and eliminate single points of failure, Freenet employs a completely decentralized architecture. Given that the P2P environment is inherently untrustworthy and unreliable
Quality Management on Amazon Mechanical Turk
"... Crowdsourcing services, such as Amazon Mechanical Turk, allow for easy distribution of small tasks to a large number of workers. Unfortunately, since manually verifying the quality of the submitted results is hard, malicious workers often take advantage of the verification difficulty and submit answ ..."
Abstract
-
Cited by 177 (8 self)
- Add to MetaCart
answers of low quality. Currently, most requesters rely on redundancy to identify the correct answers. However, redundancy is not a panacea. Massive redundancy is expensive, increasing significantly the cost of crowdsourced solutions. Therefore, we need techniques that will accurately estimate the quality
Inherent Time Redundancy (ITR): Using program repetition for low-overhead fault tolerance
- 37 th International Conference on Dependable Systems and Networks (DSN-37
, 2007
"... A new approach is proposed that exploits repetition inherent in programs to provide low-overhead transient fault protection in a processor. Programs repeatedly execute the same instructions within close time periods. This can be viewed as a time redundant re-execution of a program, except that input ..."
Abstract
-
Cited by 10 (2 self)
- Add to MetaCart
A new approach is proposed that exploits repetition inherent in programs to provide low-overhead transient fault protection in a processor. Programs repeatedly execute the same instructions within close time periods. This can be viewed as a time redundant re-execution of a program, except
Synonymous but not the same: The causes and consequences of codon bias.
- Nat Rev Genet
, 2010
"... When the inherent redundancy of the genetic code was discovered, scientists were rightly puzzled by the role of synonymous mutations 1 . The central dogma of molecular biology suggests that synonymous mutations -those that do not alter the encoded amino acid -will have no effect on the resulting pr ..."
Abstract
-
Cited by 133 (0 self)
- Add to MetaCart
When the inherent redundancy of the genetic code was discovered, scientists were rightly puzzled by the role of synonymous mutations 1 . The central dogma of molecular biology suggests that synonymous mutations -those that do not alter the encoded amino acid -will have no effect on the resulting
Results 1 - 10
of
763