Sciweavers

1043 search results - page 96 / 209
» Using Function Generalization to Design a Cosequential Proce...
Sort
View
DAC
2004
ACM
16 years 5 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
EDBT
2008
ACM
206views Database» more  EDBT 2008»
16 years 5 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
ICASSP
2008
IEEE
15 years 11 months ago
Stability analysis of complex maximum likelihood ica using Wirtinger calculus
The desirable asymptotic optimality properties of the maximum likelihood (ML) estimator make it an attractive solution for performing independent component analysis (ICA) as well....
Hualiang Li, Tülay Adali
DAS
2010
Springer
15 years 8 months ago
Text extraction from graphical document images using sparse representation
A novel text extraction method from graphical document images is presented in this paper. Graphical document images containing text and graphics components are considered as two-d...
Thai V. Hoang, Salvatore Tabbone
ICASSP
2009
IEEE
15 years 11 months ago
Exploiting statically schedulable regions in dataflow programs
Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP) applications, such as multi-media processing, and wireless communications. Among various f...
Ruirui Gu, Jörn W. Janneck, Mickaël Raul...