Sciweavers

987 search results - page 169 / 198
» Key Characteristics of Hymns
Sort
View
GRAPHICSINTERFACE
2001
14 years 11 months ago
Aiding Manipulation of Handwritten Mathematical Expressions through Style-Preserving Morphs
We describe a technique for enhancing a user's ability to manipulate hand-printed symbolic information by automatically improving legibility and simultaneously providing imme...
Richard Zanibbi, Kevin Novins, James Arvo, Katheri...
ICISC
2001
162views Cryptology» more  ICISC 2001»
14 years 11 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
82
Voted
ISCAPDCS
2001
14 years 11 months ago
AMOS-SDDS: A Scalable Distributed Data Manager for Windows Multicomputers
Known parallel DBMS offer at present only static partitioning schemes. Adding a storage node is then a cumbersome operation that typically requires the manual data redistribution....
Yakham Ndiaye, Aly Wane Diene, Witold Litwin, Tore...
NIPS
2004
14 years 11 months ago
Reducing Spike Train Variability: A Computational Theory Of Spike-Timing Dependent Plasticity
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron ...
Sander M. Bohte, Michael C. Mozer
SSWMC
2004
14 years 11 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp