Sciweavers

2642 search results - page 124 / 529
» The development of Chez Scheme
Sort
View
ISCAS
1994
IEEE
104views Hardware» more  ISCAS 1994»
15 years 2 months ago
A Homotopy Continuation Method for Parameter Estimation in MRF Models and Image Restoration
In this paper, we present an alternate approach to estimate the parameters of a Markov random field (MRF) model for images using the concepts of homotopy continuation method. We a...
P. K. Nanda, Uday B. Desai, P. G. Poonacha
IICS
2010
Springer
15 years 1 months ago
Using Digital Images to spread Executable Code on Internet
. Steganography is defined as covered writing and it has been used to achieve confidentiality. Most of research in this domain has focused in just sending plain data. In this paper...
Roberto Gómez, Gabriel Ramírez
HPCA
1995
IEEE
15 years 1 months ago
Access Ordering and Memory-Conscious Cache Utilization
As processor speeds increase relative to memory speeds, memory bandwidth is rapidly becoming the limiting performance factor for many applications. Several approaches to bridging ...
Sally A. McKee, William A. Wulf
ADMA
2005
Springer
134views Data Mining» more  ADMA 2005»
14 years 12 months ago
An LZ78 Based String Kernel
We develop the notion of normalized information distance (NID) [7] into a kernel distance suitable for use with a Support Vector Machine classifier, and demonstrate its use for an...
Ming Li, Ronan Sleep
APSEC
2005
IEEE
14 years 12 months ago
Using Dynamic Aspects for Delegating Fine-Grained Access Rights
This paper shows that a proper combination of instance-level aspects and dynamic deployment can be used to enhance an aspect-based access control system with dynamic and fine-grai...
Kung Chen