Sciweavers

5481 search results - page 1017 / 1097
» Application Analysis for Parallel Processing
Sort
View
TCSV
2008
124views more  TCSV 2008»
14 years 9 months ago
A Block-Edge-Pattern-Based Content Descriptor in DCT Domain
In this correspondence, we describe a robust and effective content descriptor based on block edge patterns extracted directly in DCT domain, which is suitable for applications in J...
Jianmin Jiang, Kaijin Qiu, Guoqiang Xiao
TIFS
2008
145views more  TIFS 2008»
14 years 9 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TII
2008
98views more  TII 2008»
14 years 9 months ago
Formal Methods for Systems Engineering Behavior Models
Abstract--Safety analysis in Systems Engineering (SE) processes, as usually implemented, rarely relies on formal methods such as model checking since such techniques, however power...
Charlotte Seidner, Olivier H. Roux
TIP
2008
256views more  TIP 2008»
14 years 9 months ago
Image-Based Human Age Estimation by Manifold Learning and Locally Adjusted Robust Regression
Estimating human age automatically via facial image analysis has lots of potential real-world applications, such as human computer interaction and multimedia communication. However...
Guodong Guo, Yun Fu, Charles R. Dyer, Thomas S. Hu...
JDWM
2007
112views more  JDWM 2007»
14 years 9 months ago
Empowering the OLAP Technology to Support Complex Dimension Hierarchies
Comprehensive data analysis has become indispensable in a variety of domains. OLAP (On-Line Analytical Processing) systems tend to perform poorly or even fail when applied to comp...
Svetlana Mansmann, Marc H. Scholl
« Prev « First page 1017 / 1097 Last » Next »