Sciweavers

9186 search results - page 1630 / 1838
» A Module System for Scheme
Sort
View
105
Voted
ICDCS
2007
IEEE
15 years 7 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ICDE
2007
IEEE
152views Database» more  ICDE 2007»
15 years 7 months ago
Automatically Identifying Known Software Problems
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated dia...
Natwar Modani, Rajeev Gupta, Guy M. Lohman, Tanvee...
ICIP
2007
IEEE
15 years 7 months ago
Palmprint Verification using Complex Wavelet Transform
Palmprint is a unique and reliable biometric characteristic with high usability. With the increasing demand of automatic palmprint authentication systems, the development of accur...
Lei Zhang, Zhenhua Guo, Zhou Wang, David Zhang
109
Voted
ICIP
2007
IEEE
15 years 7 months ago
Distributed Compression of Multi-View Images using a Geometrical Coding Approach
In this paper, we propose a distributed compression approach for multi-view images, where each camera efficiently encodes its visual information locally without requiring any col...
Nicolas Gehrig, Pier Luigi Dragotti
117
Voted
ICMCS
2007
IEEE
214views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Exploring Discriminative Learning for Text-Independent Speaker Recognition
Speaker verification is a technology of verifying the claimed identity of a speaker based on the speech signal from the speaker (voice print). To learn the score of similarity be...
Ming Liu, Zhengyou Zhang, Mark Hasegawa-Johnson, T...
« Prev « First page 1630 / 1838 Last » Next »