Sciweavers

3902 search results - page 678 / 781
» Hardware Synthesis from C C Models
Sort
View
76
Voted
HCI
2009
14 years 10 months ago
Long Term Repair of Learning Disability through Short-Term Reduction of CNS Inhibition
Learning disabilities are serious societal problems contributing to a loss of quality of life for affected individuals and their families. We hypothesized that the learning disabil...
H. Craig Heller, Damien Colas, Norman F. Ruby, Fab...
ICIP
2009
IEEE
14 years 10 months ago
An efficient and robust sequential algorithm for background estimation in video surveillance
Many computer vision algorithms such as object tracking and event detection assume that a background model of the scene under analysis is known. However, in many practical circums...
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
109
Voted
ICIP
2009
IEEE
14 years 10 months ago
Blind deblurring of foreground-background images
This paper presents a method for deblurring an image consisting of two layers (a foreground layer and a background layer) which have suffered different, unknown blurs. This is a s...
Mariana S. C. Almeida, Luis B. Almeida
132
Voted
ICOODB
2009
246views Database» more  ICOODB 2009»
14 years 10 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
14 years 10 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...