Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ACSC
2015
IEEE
4 years 10 months ago
Image Reconstruction based on Block-based Compressive Sensing
The data of interest are assumed to be represented as Ndimensional real vectors, and these vectors are compressible in some linear basis B, implying that the signals can be recons...
Hanxu You, Jie Zhu
ACSC
2015
IEEE
4 years 10 months ago
A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
Jeff Herbert, Alan Litchfield
ACSC
2015
IEEE
4 years 10 months ago
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
Sepehr Damavandinejadmonfared, Vijay Varadharajan
ACSC
2015
IEEE
4 years 10 months ago
Dynamic Topic Detection Model by Fusing Sentiment Polarity
Traditional static topic models mainly focus on the statistical correlation between words, but ignore the sentiment tendency and the temporal properties which may have great effec...
Xi Ding, Lan-Shan Zhang, Ye Tian, Xiangyang Gong, ...
ACSC
2015
IEEE
4 years 10 months ago
An Integration of Software Engineering Methods and Semantic Technologies for Drafting and Modeling Statutes and Legal Rules
The semantic representation and modeling of legal texts has for a long time been a significant research challenge. While approaches from both, software engineering and semantic m...
Martin Stabauer, Gerald Quirchmayr, Johann Hö...
ACSC
2015
IEEE
4 years 10 months ago
A Macro-Level Model for Investigating the E ect of Directional Bias on Network Coverage
Random walks have been proposed as a simple method of efficiently searching, or disseminating information throughout, communication and sensor networks. In nature, animals (such a...
Graeme Smith, Jeff W. Sanders, Qin Li
ACSC
2015
IEEE
4 years 10 months ago
Schema Mapping Using Hybrid Ripple-Down Rules
Schema mapping is essential to manage schema heterogeneity among different sources. Schema mapping can be conducted by using machine learning algorithms or by knowledge engineerin...
Sarawat Anam, Yang Sok Kim, Byeong Ho Kang, Qing L...
TCS
2016
4 years 10 months ago
Minimizing average flow-time under knapsack constraint
We give the first logarithmic approximation for minimizing average flow-time of jobs in the subset parallel machine setting (also called the restricted assignment setting) under...
Suman Kalyan Bera, Syamantak Das, Amit Kumar 0001
TCS
2016
4 years 10 months ago
Capacitated Max-Batching with interval graph compatibilities
We consider the problem of partitioning interval graphs into cliques of bounded size. Each interval has a weight, and the cost of a clique is the maximum weight of any interval in...
Tim Nonner
TCS
2016
4 years 10 months ago
On competitive recommendations
We are given an unknown binary matrix, where the entries correspond to preferences of users on items. We want to find at least one 1-entry in each row with a minimum number of que...
Jara Uitto, Roger Wattenhofer
books