Sciweavers

996 search results - page 177 / 200
» Enhancing UML Models: A Domain Analysis Approach
Sort
View
BMCBI
2004
144views more  BMCBI 2004»
15 years 1 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...
127
Voted
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 8 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CAIP
2009
Springer
252views Image Analysis» more  CAIP 2009»
15 years 8 months ago
Incorporating Shape Features in an Appearance-Based Object Detection System
Most object detection techniques discussed in the literature are based solely on texture-based features that capture the global or local appearance of an object. While results indi...
Gurman Gill, Martin Levine
107
Voted
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
15 years 8 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...
VTC
2007
IEEE
15 years 8 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer