Sciweavers

1141 search results - page 151 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
135
Voted
IJNSEC
2007
161views more  IJNSEC 2007»
15 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
ICIP
2010
IEEE
15 years 2 months ago
Real-time 3D reconstruction and pose estimation for human motion analysis
In this paper, we present a markerless 3D motion capture system based on a volume reconstruction technique of non rigid bodies. It depicts a new approach for pose estimation in or...
Holger Graf, Sang Min Yoon, Cornelius Malerczyk
VLSID
2007
IEEE
142views VLSI» more  VLSID 2007»
16 years 4 months ago
Controllability-driven Power Virus Generation for Digital Circuits
The problem of peak power estimation in CMOS circuits is essential for analyzing the reliability and performance of circuits at extreme conditions. The Power Virus problem involves...
K. Najeeb, Karthik Gururaj, V. Kamakoti, Vivekanan...
CEC
2007
IEEE
15 years 8 months ago
Development and validation of different hybridization strategies between GA and PSO
In this paper a new class of hybridization strategies between GA and PSO is presented and validated. The Genetical Swarm Optimization (GSO) approach is presented here with respect ...
A. Gandelli, F. Grimaccia, Marco Mussetta, Paola P...
ISSTA
2010
ACM
15 years 6 months ago
Exploiting program dependencies for scalable multiple-path symbolic execution
This paper presents a new technique, called Symbolic Program Decomposition (or SPD), for symbolic execution of multiple paths that is more scalable than existing techniques, which...
Raúl A. Santelices, Mary Jean Harrold