Sciweavers

2784 search results - page 232 / 557
» Light analysis of complex systems
Sort
View
SIGECOM
2005
ACM
105views ECommerce» more  SIGECOM 2005»
15 years 11 months ago
Towards truthful mechanisms for binary demand games: a general framework
The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They...
Ming-Yang Kao, Xiang-Yang Li, Weizhao Wang
IWVF
2001
Springer
15 years 10 months ago
Volume and Surface Area Distributions of Cracks in Concrete
Volumetric images of small mortar samples under load are acquired by X-ray microtomography. The images are binarized at many different threshold values, and over a million connecte...
George Nagy, Tong Zhang, W. R. Franklin, Eric Land...
TIP
2008
85views more  TIP 2008»
15 years 5 months ago
A Scale-Based Connected Coherence Tree Algorithm for Image Segmentation
This paper presents a connected coherence tree algorithm (CCTA) for image segmentation with no prior knowledge. It aims to find regions of semantic coherence based on the proposed ...
Jundi Ding, RuNing Ma, Songcan Chen
ISCAS
1994
IEEE
111views Hardware» more  ISCAS 1994»
15 years 9 months ago
Linear Phase Cosine Modulated Maximally Decimated Filter Banks with Perfect Reconstruction
In this paper a new type of maximally decimated FIR cosine modulated filter banks is proposed. Each analysis and synthesis filter in this filter bank has linear phase. We can desig...
Yuan-Pei Lin, P. P. Vaidyanathan
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 11 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao