Sciweavers

4930 search results - page 948 / 986
» Testing a Safety-Critical Application
Sort
View
SSWMC
2004
15 years 1 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
IQ
2003
15 years 1 months ago
Data Quality in Genome Databases
: Genome databases store data about molecular biological entities such as genes, proteins, diseases, etc. The main purpose of creating and maintaining such databases in commercial ...
Heiko Müller, Felix Naumann
NAACL
2003
15 years 1 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees
OPODIS
2003
15 years 1 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
PICS
2003
15 years 1 months ago
Selection of Training Sets for the Characterisation of Multispectral Imaging Systems
To establish a correlation between the system output and the corresponding reflectance, the system characterisation functionDeriving the actual multispectral data from the output o...
Paolo Pellegri, Gianluca Novati, Raimondo Schettin...