Sciweavers

5665 search results - page 55 / 1133
» Introduction to Computer Security
Sort
View
CHI
2009
ACM
15 years 10 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
CCECE
2006
IEEE
15 years 3 months ago
Imaging of Electrode Movement and Conductivity Change in Electrical Impedance Tomography
Electrical Impedance Tomography (EIT) applies and measures electrical energy on the boundary of a medium to produce an image of its internal impedance distribution. In many medica...
Camille Gomez-Laberge, Andy Adler
ISPAN
1997
IEEE
15 years 2 months ago
RMESH Algorithms for Parallel String Matching
Abstract- String matching problem received much attention over the years due to its importance in various applications such as text/file comparison, DNA sequencing, search engines,...
Hsi-Chieh Lee, Fikret Erçal
ISCAS
1994
IEEE
131views Hardware» more  ISCAS 1994»
15 years 1 months ago
An Efficient Design Method for Optimal Weighted Median Filtering
Earlier research has shown that the problem of optimal weighted median filtering with structural constraints can be formulated as a nonconvex nonlinear programming problem in gene...
Ruikang Yang, Moncef Gabbouj, Yrjö Neuvo
BIRTHDAY
2005
Springer
14 years 11 months ago
History and Future of Implicit and Inductionless Induction: Beware the Old Jade and the Zombie!
Abstract. In this survey on implicit induction I recollect some memories on the history of implicit induction as it is relevant for future research on computer-assisted theorem pro...
Claus-Peter Wirth