Sciweavers

2455 search results - page 162 / 491
» Graphical abstract help
Sort
View
IH
2001
Springer
15 years 8 months ago
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
SIGCSE
2000
ACM
169views Education» more  SIGCSE 2000»
15 years 8 months ago
Design patterns for lazy evaluation
We propose an object-oriented (OO) formulation and implementation of lazy/delayed evaluation by reusing and extending an existing linear recursive structure (LRS) framework with t...
Dung Zung Nguyen, Stephen B. Wong
DASFAA
2010
IEEE
222views Database» more  DASFAA 2010»
15 years 8 months ago
Aquiba: An Energy-Efficient Mobile Sensing System for Collaborative Human Probes
Abstract. Portable sensory devices carried by humans--which are referred to as Human Probes--facilitate easy-to-use sensing and monitoring of urban areas. In this demonstration, we...
Niwat Thepvilojanapong, Shin'ichi Konomi, Jun'ichi...
IPPS
1999
IEEE
15 years 8 months ago
On the Design and Evaluation of Job Scheduling Algorithms
Abstract. In this paper we suggest a strategy to design job scheduling systems. To this end, we first split a scheduling system into three components: Scheduling policy, objective ...
Jochen Krallmann, Uwe Schwiegelshohn, Ramin Yahyap...
LOPSTR
1994
Springer
15 years 8 months ago
Using Call/Exit Analysis for Logic Program Transformation
A technique for transformation of definite logic programs is presented. A first phase performs an analysis of the extended call/exit patterns of the source program. It is shown tha...
Dmitri Boulanger, Maurice Bruynooghe