Sciweavers

374 search results - page 67 / 75
» Measuring Information Leakage Using Generalized Gain Functio...
Sort
View
MSR
2005
ACM
15 years 9 months ago
Analysis of signature change patterns
Software continually changes due to performance improvements, new requirements, bug fixes, and adaptation to a changing operational environment. Common changes include modificatio...
Sunghun Kim, E. James Whitehead Jr., Jennifer Beva...
VLDB
2001
ACM
92views Database» more  VLDB 2001»
15 years 8 months ago
Fast Evaluation Techniques for Complex Similarity Queries
Complex similarity queries, i.e., multi-feature multi-object queries, are needed to express the information need of a user against a large multimedia repository. Even if a user in...
Klemens Böhm, Michael Mlivoncic, Hans-Jö...
ICASSP
2007
IEEE
15 years 8 months ago
Relevance Network Modeling for Muscle Association Pattern in Reaching Movements
Our purpose is to study how different muscles collaborate together to efficiently create a smooth, coordinated reaching movement. In the EMG literature, it has been commonplace to...
Z. Jane Wang, Martin J. McKeown
CORR
2010
Springer
47views Education» more  CORR 2010»
15 years 4 months ago
Lower bounds for the error decay incurred by coarse quantization schemes
Several analog-to-digital conversion methods for bandlimited signals used in applications, such as quantization schemes, employ coarse quantization coupled with oversampling. The...
Felix Krahmer, Rachel Ward
IOT
2010
15 years 1 months ago
Evaluation of 1D barcode scanning on mobile phones
Abstract--1D or linear barcodes are the black-and-whitestriped codes that can be found on most consumer products. This work evaluates existing 1D barcode scanners for mobile phones...
Felix von Reischach, Stephan Karpischek, Florian M...