Sciweavers

877 search results - page 123 / 176
» How to Cover a Grammar
Sort
View
112
Voted
ICIP
2002
IEEE
16 years 2 months ago
Dirty-paper trellis codes for watermarking
Informed coding is the practice of representing watermark messages with patterns that are dependent on the cover Works. This requires the use of a dirty-paper code, in which each ...
Gwenaël J. Doërr, Ingemar J. Cox, Matthe...
DAC
2009
ACM
16 years 1 months ago
Fault models for embedded-DRAM macros
In this paper, we compare embedded-DRAM (eDRAM) testing to both SRAM testing and commodity-DRAM testing, since an eDRAM macro uses DRAM cells with an SRAM interface. We first star...
Ching-Yu Chin, Hao-Yu Yang, Mango Chia-Tso Chao, R...
WWW
2001
ACM
16 years 1 months ago
Designing personalized web applications
The goal of this paper is to argue the need to approach the personalization issues in Web applications from the very beginning in the application's development cycle. Since p...
Daniel Schwabe, Gustavo Rossi, Robson Guimar&atild...
125
Voted
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 29 days ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
90
Voted
CHI
2008
ACM
16 years 29 days ago
Heuristic evaluation for games: usability principles for video game design
Most video games require constant interaction, so game designers must pay careful attention to usability issues. However, there are few formal methods for evaluating the usability...
David Pinelle, Nelson Wong