Sciweavers

6248 search results - page 1150 / 1250
» Programming in a data factory
Sort
View
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
15 years 27 days ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
157
Voted
CVPR
2011
IEEE
14 years 12 months ago
Scale and Rotation Invariant Matching Using Linearly Augmented Trees
We propose a novel linearly augmented tree method for efficient scale and rotation invariant object matching. The proposed method enforces pairwise matching consistency defined ...
Hao Jiang, Tai-Peng Tian, Stan Sclaroff
143
Voted
CDC
2010
IEEE
210views Control Systems» more  CDC 2010»
14 years 10 months ago
Advances in moving horizon estimation for nonlinear systems
In the past decade, moving horizon estimation (MHE) has emerged as a powerful technique for estimating the state of a dynamical system in the presence of nonlinearities and disturb...
Angelo Alessandri, Marco Baglietto, Giorgio Battis...
203
Voted
COMPUTING
2011
14 years 10 months ago
Cloud computing for small research groups in computational science and engineering: current status and outlook
Abstract Cloud computing could offer good business models for small CSE (Computational Science and Engineering) research groups because these groups often do not have enough human ...
Hong Linh Truong, Schahram Dustdar
156
Voted
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 10 months ago
Localization from Incomplete Noisy Distance Measurements
—We consider the problem of positioning a cloud of points in the Euclidean space Rd , from noisy measurements of a subset of pairwise distances. This task has applications in var...
Adel Javanmard, Andrea Montanari
« Prev « First page 1150 / 1250 Last » Next »