Sciweavers

1489 search results - page 110 / 298
» The First Bug Report
Sort
View
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A New Deblocking Algorithm Based on Adjusted Contourlet Transform
A new postprocessing method based on adjusted contourlet transform is introduced in this paper for suppressing blocking artifacts (BA) in block-based discrete cosine transform (BD...
Haohao Song, Songyu Yu, Chen Wang, Li Song, Hongka...
IOLTS
2006
IEEE
84views Hardware» more  IOLTS 2006»
15 years 10 months ago
An Improved Technique for Reducing False Alarms Due to Soft Errors
A significant fraction of soft errors in modern microprocessors has been reported to never lead to a system failure. Any concurrent error detection scheme that raises alarm every ...
Sandip Kundu, Ilia Polian
IPPS
2006
IEEE
15 years 10 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
120
Voted
IROS
2006
IEEE
130views Robotics» more  IROS 2006»
15 years 10 months ago
Tele-Operated High Speed Anthropomorphic Dextrous Hands with Object Shape and Texture Identification
- This paper reports on the development of two Tele-Operated High Speed Anthropomorphic Dextrous robotic hands. The aim of developing these hands was to achieve a system that seaml...
P. Y. Chua, M. Bezdicek, Steve Davis, Darwin G. Ca...
112
Voted
SIGCSE
2006
ACM
119views Education» more  SIGCSE 2006»
15 years 10 months ago
Practice what you preach: full separation of concerns in CS1/CS2
We argue that the failure to separate the concerns in CS1 is the leading cause of difficulty in teaching OOP in the first year. We show how the concerns can be detangled and prese...
Hamzeh Roumani