Sciweavers

4790 search results - page 24 / 958
» Reverse Query Processing
Sort
View
ICIP
2006
IEEE
15 years 3 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
WCRE
2008
IEEE
15 years 3 months ago
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas
Data modeling is an essential part of the software development process, and together with application modeling forms the core of the model-driven approach to software engineering....
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
15 years 10 months ago
Query Folding
Query folding refers to the activity of determining if and how a query can be answered using a given set of resources, which might be materialized views, cached results of previou...
Xiaolei Qian
BMVC
2000
14 years 10 months ago
Parallel Chains, Delayed Rejection and Reversible Jump MCMC for Object Recognition
We tackle the problem of object recognition using a Bayesian approach. A marked point process [1] is used as a prior model for the (unknown number of) objects. A sample is generat...
M. Harkness, P. Green
WCRE
2008
IEEE
15 years 3 months ago
A Business Process Explorer: Recovering Business Processes from Business Applications
A business process contains a set of logically related tasks executed to fulfill business goals. Business applications enable organizations to automatically perform their daily op...
Jin Guo, Ying Zou