Sciweavers

2006 search results - page 68 / 402
» Heuristic Security-Testing Methods
Sort
View
CORR
2006
Springer
68views Education» more  CORR 2006»
15 years 18 days ago
A rigorous proof of the cavity method for counting matchings
In this paper we rigorously prove the validity of the cavity method for the problem of counting the number of matchings in graphs with large girth. Cavity method is an important he...
Mohsen Bayati, Chandra Nair
67
Voted
IVC
2006
87views more  IVC 2006»
15 years 16 days ago
On the relation between Memon's and the modified Zeng's palette reordering methods
Palette reordering has been shown to be a very effective approach for improving the compression of color-indexed images by general purpose continuous-tone image coding techniques....
Armando J. Pinho, António J. R. Neves
102
Voted
ICPR
2008
IEEE
15 years 7 months ago
A novel orientation free method for online unconstrained cursive handwritten chinese word recognition
In this paper, we propose an orientation free method for unconstrained cursive handwritten Chinese word recognition. By a novel gravity center balancing method, the orientation of...
Teng Long, Lianwen Jin
BCSHCI
2007
15 years 2 months ago
A pattern-based usability inspection method: first empirical performance measures and future issues
The Usability Pattern Inspection (UPI) is a new usability inspection method designed for the added downstream utility of producing concrete design recommendations. This paper prov...
Martin Schmettow, Sabine Niebuhr
94
Voted
COCOON
2007
Springer
15 years 6 months ago
Seed-Based Exclusion Method for Non-coding RNA Gene Search
Given an RNA family characterized by conserved sequences and folding constraints, the problem is to search for all the instances of the RNA family in a genomic database. As seed-ba...
Jean-Eudes Duchesne, Mathieu Giraud, Nadia El-Mabr...