Sciweavers

9316 search results - page 59 / 1864
» Analysis of traceback techniques
Sort
View
IWPC
2005
IEEE
15 years 3 months ago
A Qualitative Comparison of Three Aspect Mining Techniques
The fact that crosscutting concerns (aspects) cannot be well modularized in object oriented software is an impediment to program comprehension: the implementation of a concern is ...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
JMM2
2008
92views more  JMM2 2008»
14 years 9 months ago
Dimensionality Reduction using SOM based Technique for Face Recognition
Unsupervised or Self-Organized learning algorithms have become very popular for discovery of significant patterns or features in the input data. The three prominent algorithms name...
Dinesh Kumar, C. S. Rai, Shakti Kumar
CCR
2004
151views more  CCR 2004»
14 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
ICCS
2009
Springer
14 years 7 months ago
Geostatistical Computing in PSInSAR Data Analysis
The presented paper describes the geostatistical analysis of PSInSAR data. This analysis was preceded by short description of PSInSAR technique. The geostatistical computations sho...
Andrzej Lesniak, Stanislawa Porzycka
ICDAR
2007
IEEE
15 years 4 months ago
An Efficient Word Segmentation Technique for Historical and Degraded Machine-Printed Documents
Word segmentation is a crucial step for segmentation-free document analysis systems and is used for creating an index based on word matching. In this paper, we propose a novel met...
Michael Makridis, N. Nikolaou, Basilios Gatos