Sciweavers

382 search results - page 36 / 77
» Using C in CS1: evaluating the Stanford experience
Sort
View
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
15 years 3 months ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng
PAKDD
2010
ACM
179views Data Mining» more  PAKDD 2010»
15 years 2 months ago
Answer Diversification for Complex Question Answering on the Web
We present a novel graph ranking model to extract a diverse set of answers for complex questions via random walks over a negative-edge graph. We assign a negative sign to edge weig...
Palakorn Achananuparp, Xiaohua Hu, Tingting He, Ch...
IPPS
1999
IEEE
15 years 2 months ago
Dynamic Process Composition and Communication Patterns in Irregularly Structured Applications
In this paper we describe one experiment in which a new coordination language, called MANIFOLD, is used to restructure an existing sequential Fortran code from computational uid dy...
C. T. H. Everaars, Barry Koren, Farhad Arbab
ITC
1996
IEEE
96views Hardware» more  ITC 1996»
15 years 2 months ago
Analysis and Detection of Timing Failures in an Experimental Test Chip
A 25k gate Test Chip was designed and manufactured to evaluate different test methods for scan-designed circuits. The design of the chip, the experiment, and preliminary experimen...
Piero Franco, Siyad C. Ma, Jonathan Chang, Yi-Chin...
RC
1998
41views more  RC 1998»
14 years 9 months ago
Estimating Uncertainties for Geophysical Tomography
We present statistical and interval techniques for evaluating the uncertainties associated with geophysical tomographic inversion problems, including estimation of data errors, mo...
Diane I. Doser, Kevin D. Crain, Mark R. Baker, Vla...