Sciweavers

402 search results - page 59 / 81
» Cryptosystems using Linear Groups
Sort
View
ICSM
2009
IEEE
15 years 4 months ago
On predicting the time taken to correct bug reports in open source projects
Existing studies on the maintenance of open source projects focus primarily on the analyses of the overall maintenance of the projects and less on specific categories like the co...
Prasanth Anbalagan, Mladen A. Vouk
ACCV
2007
Springer
15 years 1 months ago
Efficiently Solving the Fractional Trust Region Problem
Normalized Cuts has successfully been applied to a wide range of tasks in computer vision, it is indisputably one of the most popular segmentation algorithms in use today. A number...
Anders P. Eriksson, Carl Olsson, Fredrik Kahl
CSEE
2006
Springer
14 years 12 months ago
On the Influence of Test-Driven Development on Software Design
Test-driven development (TDD) is an agile software development strategy that addresses both design and testing. This paper describes a controlled experiment that examines the effe...
David Janzen, Hossein Saiedian
ICASSP
2011
IEEE
14 years 1 months ago
F0 range and peak alignment across speakers and emotions
We present an analysis of F0 range and peak alignment in emotional speech from a heterogeneous group of speakers varying in age and gender. Both speaker and emotion had a strong e...
Eric Morley, Jan P. H. van Santen, Esther Klabbers...
ICDAR
2011
IEEE
13 years 9 months ago
A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition
—LDA transformation is one of the popular feature dimension reduction techniques for the feature extraction in most handwritten Chinese characters recognition systems. The integr...
Xue Gao, Wenhuan Wen, Lianwen Jin