Sciweavers

1424 search results - page 154 / 285
» The Multi-radius Cover Problem
Sort
View
IWSOC
2003
IEEE
104views Hardware» more  IWSOC 2003»
15 years 8 months ago
IP Watermarking Techniques: Survey and Comparison
— Intellectual property (IP) block reuse is essential for facilitating the design process of System-on-a-Chip. Sharing IP blocks in such a competitive market poses significant h...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
SIGUCCS
2003
ACM
15 years 8 months ago
Being Sam Malone: customer service on a campus where "Everybody Knows Your Name"
Working on a small campus has many advantages: Familiarity with the majority of faculty and staff, in-depth knowledge of how systems interact, adding the personal touch to each in...
Mark Watts
GECCO
2003
Springer
113views Optimization» more  GECCO 2003»
15 years 8 months ago
The Effect of Binary Matching Rules in Negative Selection
Negative selection algorithm is one of the most widely used techniques in the field of artificial immune systems. It is primarily used to detect changes in data/behavior patterns...
Fabio A. González, Dipankar Dasgupta, Jonat...
ICIAP
2003
ACM
15 years 8 months ago
Painting crack elimination using viscous morphological reconstruction
A method for the elimination of cracks in infrared reflectograms is presented. Infrared reflectograms show the underdrawing – the basic concept of the artist drawn on the grou...
Allan Hanbury, Paul Kammerer, Ernestine Zolda
ICALP
2010
Springer
15 years 8 months ago
The Downward-Closure of Petri Net Languages
We show that the downward-closure of a Petri net language is effectively computable. This is mainly done by using the notions defined for showing decidability of the reachability...
Peter Habermehl, Roland Meyer, Harro Wimmel