Sciweavers

3077 search results - page 355 / 616
» Design Principles for Application Integration
Sort
View
DAC
2000
ACM
16 years 4 months ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
166
Voted
ICDS
2010
IEEE
15 years 10 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
INFOCOM
2007
IEEE
15 years 10 months ago
Point-Casting Service in Wireless Networks
— The broadcast nature of existing wireless LANs can produce excessive radio coverage which is often undesirable for applications like wireless IPTV or location-based service. To...
Zhengrong Ji, Maneesh Varshney, Junlan Zhou, Rajiv...
CIVR
2007
Springer
15 years 10 months ago
Comparison of face matching techniques under pose variation
The ability to match faces in video is a crucial component for many multimedia applications such as searching and recognizing people in semantic video browsing, surveillance and h...
Bart Kroon, Alan Hanjalic, Sabri Boughorbel
ISMIR
2005
Springer
215views Music» more  ISMIR 2005»
15 years 9 months ago
Separation of Vocals from Polyphonic Audio Recordings
Source separation techniques like independent component analysis and the more recent non-negative matrix factorization are gaining widespread use for the monaural separation of in...
Shankar Vembu, Stephan Baumann