• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 763
Next 10 →

Research and Reviews: Journal of Engineering and Technology Multi-Scale Recognition of Objects Approach based on Inherent Redundancy Information Entropy Equalization

by Mahdi Jalali , For Correspondence
"... ABSTRACT Development of new imaging sensors arise the need for image processing techniques that can effectively fuse images from different sensors into a single coherent composition for interpretation. In order to make use of inherent redundancy and extended coverage of multiple sensors, we propose ..."
Abstract - Add to MetaCart
ABSTRACT Development of new imaging sensors arise the need for image processing techniques that can effectively fuse images from different sensors into a single coherent composition for interpretation. In order to make use of inherent redundancy and extended coverage of multiple sensors, we

Securing ad hoc networks

by Lidong Zhou, Zygmunt J. Haas
"... Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operation ..."
Abstract - Cited by 1064 (15 self) - Add to MetaCart
network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between

Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression

by John G. Daugman , 1988
"... A three-layered neural network is described for transforming two-dimensional discrete signals into generalized nonorthogonal 2-D “Gabor” representations for image analysis, segmentation, and compression. These transforms are conjoint spatial/spectral representations [lo], [15], which provide a comp ..."
Abstract - Cited by 478 (8 self) - Add to MetaCart
complete image description in terms of locally windowed 2-D spectral coordinates embedded within global 2-D spatial coordinates. Because intrinsic redundancies within images are extracted, the resulting image codes can be very compact. However, these conjoint transforms are inherently difficult to compute

Redundant

by Anne Raich, Tamás Liszkai
"... Abstract. A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problems is exploited by applying an implicit redundant representation (IRR) genetic algorithm. The unbraced frame st ..."
Abstract - Add to MetaCart
Abstract. A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problems is exploited by applying an implicit redundant representation (IRR) genetic algorithm. The unbraced frame

Exploiting Inherent Program Redundancy for Fault Tolerance

by Xuanhua Li , 2009
"... Technology scaling has led to growing concerns about reliability in micro-processors. Currently, fault tolerance studies rely on creating explicitly redundant execution for fault detection or recovery, which usually involves expensive cost on performance, power, or hardware, etc. In our study, we fi ..."
Abstract - Add to MetaCart
find exploiting program’s inherent redundancy can better trade off between reliability, performance, and hard-ware cost. This work proposes two approaches to enhance program reliability. The first approach investigates the additional fault resilience at the application level. We explore program

Exploiting Microarchitectural Redundancy for Defect Tolerance

by Premkishore Shivakumar, Stephen W. Keckler, Charles R. Moore, Doug Burger - the 21st International Conference on Computer Design (ICCD , 2003
"... Continued advancements in fabrication technology and reductions in feature size create challenges in maintaining both manufacturing yield rates and long-term reliability of devices. Methods based on defect detection and reduction may not offer a scalable solution due to cost of eliminating contamina ..."
Abstract - Cited by 59 (4 self) - Add to MetaCart
contaminants in the manufacturing process and increasing chip complexity. This paper proposes to use the inherent redundancy available in existing and future chip microarchitectures to improve yield and enable graceful performance degradation in fail-in-place systems. We introduce a new yield metric called

Protecting Free Expression Online with Freenet

by Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, Brandon Wiley , 2002
"... ially hundreds of thousands of desktop computers to create a collaborative virtual file system. To increase network robustness and eliminate single points of failure, Freenet employs a completely decentralized architecture. Given that the P2P environment is inherently untrustworthy and unreliable, w ..."
Abstract - Cited by 211 (7 self) - Add to MetaCart
ially hundreds of thousands of desktop computers to create a collaborative virtual file system. To increase network robustness and eliminate single points of failure, Freenet employs a completely decentralized architecture. Given that the P2P environment is inherently untrustworthy and unreliable

Quality Management on Amazon Mechanical Turk

by Panagiotis G. Ipeirotis, Foster Provost, Jing Wang
"... Crowdsourcing services, such as Amazon Mechanical Turk, allow for easy distribution of small tasks to a large number of workers. Unfortunately, since manually verifying the quality of the submitted results is hard, malicious workers often take advantage of the verification difficulty and submit answ ..."
Abstract - Cited by 177 (8 self) - Add to MetaCart
answers of low quality. Currently, most requesters rely on redundancy to identify the correct answers. However, redundancy is not a panacea. Massive redundancy is expensive, increasing significantly the cost of crowdsourced solutions. Therefore, we need techniques that will accurately estimate the quality

Inherent Time Redundancy (ITR): Using program repetition for low-overhead fault tolerance

by Vimal Reddy, Eric Rotenberg - 37 th International Conference on Dependable Systems and Networks (DSN-37 , 2007
"... A new approach is proposed that exploits repetition inherent in programs to provide low-overhead transient fault protection in a processor. Programs repeatedly execute the same instructions within close time periods. This can be viewed as a time redundant re-execution of a program, except that input ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
A new approach is proposed that exploits repetition inherent in programs to provide low-overhead transient fault protection in a processor. Programs repeatedly execute the same instructions within close time periods. This can be viewed as a time redundant re-execution of a program, except

Synonymous but not the same: The causes and consequences of codon bias.

by Joshua B Plotkin , Grzegorz Kudla - Nat Rev Genet , 2010
"... When the inherent redundancy of the genetic code was discovered, scientists were rightly puzzled by the role of synonymous mutations 1 . The central dogma of molecular biology suggests that synonymous mutations -those that do not alter the encoded amino acid -will have no effect on the resulting pr ..."
Abstract - Cited by 133 (0 self) - Add to MetaCart
When the inherent redundancy of the genetic code was discovered, scientists were rightly puzzled by the role of synonymous mutations 1 . The central dogma of molecular biology suggests that synonymous mutations -those that do not alter the encoded amino acid -will have no effect on the resulting
Next 10 →
Results 1 - 10 of 763
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University