Sciweavers

5864 search results - page 196 / 1173
» Can We Work around Numerical Methods
Sort
View
142
Voted
ACSW
2006
15 years 6 months ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
ICIP
2004
IEEE
16 years 6 months ago
Towards computer-assisted photo-identification of humpback whales
This paper describes current work on a photo-id system for humpback whales. Individuals of this species can be uniquely identified by the light and dark pigmentation patches on th...
Elena Ranguelova, Mark J. Huiskes, Eric J. Pauwels
ASPDAC
2000
ACM
78views Hardware» more  ASPDAC 2000»
15 years 9 months ago
A sigma-delta modulation based BIST scheme for mixed-signal circuits
In this work, we present the analysis of a built-in self-test (BIST) scheme for mixed-signal circuits that is intended to provide on-chip stimulus generation and response analysis...
Jiun-Lang Huang, Kwang-Ting Cheng
115
Voted
EUSFLAT
2001
107views Fuzzy Logic» more  EUSFLAT 2001»
15 years 6 months ago
Enriching vague queries by fuzzy orderings
The Vague Query System (VQS) due to Kiing and Palkoska is an add-on to relational databases which is able to suggest alternative query results in case that an exact query fails. T...
Ulrich Bodenhofer, Josef Küng
TWC
2010
14 years 11 months ago
A novel CAC scheme for homogeneous 802.11 networks
This paper proposes a new call admission control (CAC) scheme for one-hop homogeneous 802.11 DCF networks. Using the proposed scheme, we can perform admission control quickly and e...
Qinglin Zhao, Danny H. K. Tsang, Taka Sakurai