Sciweavers

241 search results - page 45 / 49
» Towards Safe Model Transformation for Constraint-driven Mode...
Sort
View
DATE
2009
IEEE
148views Hardware» more  DATE 2009»
15 years 4 months ago
Visual quality analysis for dynamic backlight scaling in LCD systems
—With the trend toward high-quality large form factor displays on high-end handhelds, LCD backlight accounts for a significant and increasing percentage of the total energy budg...
Andrea Bartolini, Martino Ruggiero, Luca Benini
ICPR
2010
IEEE
15 years 3 months ago
Road Sign Detection in Images: A Case Study
Road sign identification in images is an important issue, in particular for vehicle safety applications. It is usually tackled in three stages: detection, recognition and trackin...
Rachid Belaroussi, Philippe Foucher, Jean-Philippe...
HT
2005
ACM
15 years 3 months ago
Searching a file system using inferred semantic links
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...
Deepavali Bhagwat, Neoklis Polyzotis
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
15 years 3 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung