Sciweavers

13717 search results - page 2499 / 2744
» Control Systems
Sort
View
IH
1998
Springer
15 years 7 months ago
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is ...
Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depove...
KDD
1998
ACM
160views Data Mining» more  KDD 1998»
15 years 7 months ago
Algorithms for Characterization and Trend Detection in Spatial Databases
1 The number and the size of spatial databases, e.g. for geomarketing, traffic control or environmental studies, are rapidly growing which results in an increasing need for spatial...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
151
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 7 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
129
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 7 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
WADT
1998
Springer
15 years 7 months ago
Complete Strategies for Term Graph Narrowing
Abstract. Narrowing is a method for solving equations in the equational theories of term rewriting systems. Unification and rewriting, the central operations in narrowing, are ofte...
Annegret Habel, Detlef Plump
« Prev « First page 2499 / 2744 Last » Next »