Sciweavers

2421 search results - page 320 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
EFDBS
2000
15 years 6 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
ICPR
2004
IEEE
16 years 6 months ago
Prioritized Region of Interest Coding in JPEG2000
A method is proposed to encode multiple regions of interest in the JPEG2000 image-coding framework. The algorithm is based on the rearrangement of packets in the code-stream to pl...
Victor Sanchez, Anup Basu, Mrinal K. Mandal
DAC
2005
ACM
16 years 5 months ago
Minimising buffer requirements of synchronous dataflow graphs with model checking
Signal processing and multimedia applications are often implemented on resource constrained embedded systems. It is therefore important to find implementations that use as little ...
Marc Geilen, Twan Basten, Sander Stuijk
EWSN
2010
Springer
16 years 1 months ago
Radio Interferometric Angle of Arrival Estimation
Abstract. Several localization algorithms exist for wireless sensor networks that use angle of arrival measurements to estimate node position. However, there are limited options fo...
Isaac Amundson, János Sallai, Xenofon D. Ko...
SEMWEB
2007
Springer
15 years 11 months ago
Data Mining to Support Engineering Design Decision
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance o...
Pooja Jadhav, Sylvia C. Wong, Gary B. Wills, Richa...