Sciweavers

9316 search results - page 84 / 1864
» Analysis of traceback techniques
Sort
View
PREMI
2005
Springer
15 years 5 months ago
Globally Optimal 3D Image Reconstruction and Segmentation Via Energy Minimisation Techniques
This paper provides an overview of a number of techniques developed within our group to perform 3D reconstruction and image segmentation based of the application of energy minimisa...
Brian C. Lovell
SIGDOC
2003
ACM
15 years 5 months ago
Using AI techniques to aid hypermedia design
Artificial intelligence techniques have found a number of applications in hypermedia, mostly in two specific areas, user interface, particularly adaptive ones and information sear...
Elena I. Gaura, Robert M. Newman
IH
1999
Springer
15 years 4 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
CODES
2001
IEEE
15 years 3 months ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont
MC
2008
122views Computer Science» more  MC 2008»
15 years 1 months ago
Interaction Techniques for Case Selection in Medical Computer Based Training Systems
The vast majority of medical computer-based training (CBT) systems aim at problem-oriented case based training. A crucial issue in the design of CBT systems is the selection of ap...
Ragnar Bade, Jeanette Cordes, Maik Mewes, Bernhard...