Sciweavers

3778 search results - page 105 / 756
» Erdos-Ko-Rado for three sets
Sort
View
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
15 years 10 months ago
Electron counting based high-radix multiplication in single electron tunneling technology
Abstract— This paper investigates the implementation of highradix multiplication based on the Electron Counting (EC) paradigm in Single Electron Tunneling (SET) technology. First...
Cor Meenderinck, Sorin Cotofana
ICMCS
2005
IEEE
107views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Evaluating keypoint methods for content-based copyright protection of digital images
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
Larry Huston, Rahul Sukthankar, Yan Ke
ACIVS
2005
Springer
15 years 9 months ago
Gender Classification in Human Gait Using Support Vector Machine
We describe an automated system that classifies gender by utilising a set of human gait data. The gender classification system consists of three stages: i) detection and extraction...
Jang-Hee Yoo, Doosung Hwang, Mark S. Nixon
CPAIOR
2005
Springer
15 years 9 months ago
Filtering Algorithms for the NValue Constraint
Abstract. The NValue constraint counts the number of different values assigned to a vector of variables. Propagating generalized arc consistency on this constraint is NP-hard. We ...
Christian Bessière, Emmanuel Hebrard, Brahi...
ICFCA
2005
Springer
15 years 9 months ago
Lessons Learned in Applying Formal Concept Analysis to Reverse Engineering
A key difficulty in the maintenance and evolution of complex software systems is to recognize and understand the implicit dependencies that define contracts that must be respecte...
Gabriela Arévalo, Stéphane Ducasse, ...