Sciweavers

1441 search results - page 152 / 289
» A Practical Approach to Network-Based Processing
Sort
View
95
Voted
ICIP
2000
IEEE
15 years 4 months ago
Open-Ended Texture Classification for Terrain Mapping
This paper introduces a new classification scheme called “open-ended texture classification.” The standard approach for texture classification is to use a closed n-class cl...
Rupert Paget, I. Dennis Longstaff
WER
1999
Springer
15 years 4 months ago
Activity Theory: a Framework to Software Requirements Elicitation
In this article we defend the idea that social aspects have strong influence in the software requirements elicitation (Goguen 1993), which drive us to find help in the social scien...
Luiz Eduardo Galvão Martins, Beatriz Mascia...
FC
1998
Springer
164views Cryptology» more  FC 1998»
15 years 4 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
98
Voted
EH
2004
IEEE
102views Hardware» more  EH 2004»
15 years 4 months ago
Design Space Issues for Intrinsic Evolvable Hardware
This paper discusses the problem of increased programming time for intrinsic evolvable hardware (EHW) as the complexity of the circuit grows. We develop equations for the size of ...
James Hereford, David A. Gwaltney
DAWAK
2006
Springer
15 years 4 months ago
Efficient Mining of Large Maximal Bicliques
Abstract. Many real world applications rely on the discovery of maximal biclique subgraphs (complete bipartite subgraphs). However, existing algorithms for enumerating maximal bicl...
Guimei Liu, Kelvin Sim, Jinyan Li