Sciweavers

3731 search results - page 653 / 747
» cases 2006
Sort
View
186
Voted
IJCV
2007
363views more  IJCV 2007»
15 years 16 days ago
Image Analysis and Reconstruction using a Wavelet Transform Constructed from a Reducible Representation of the Euclidean Motion
Abstract. Inspired by the early visual system of many mammalians we consider the construction of-and reconstruction from- an orientation score Uf : R2 ×S1 → C as a local orienta...
Remco Duits, Michael Felsberg, Gösta H. Granl...
107
Voted
IJFCS
2007
98views more  IJFCS 2007»
15 years 16 days ago
Modular Ranking Abstraction
Ranking Abstraction Ittai Balaban Computer Science Department, New York University, 251 Mercer St., New York, New York 10012, United States and Amir Pnueli Computer Science Departm...
Ittai Balaban, Amir Pnueli, Lenore D. Zuck
95
Voted
IJFCS
2007
111views more  IJFCS 2007»
15 years 16 days ago
Involutively Bordered Words
In this paper we study a generalization of the classical notions of bordered and unbordered words, motivated by DNA computing. DNA strands can be viewed as finite strings over th...
Lila Kari, Kalpana Mahalingam
93
Voted
IJHPCA
2007
118views more  IJHPCA 2007»
15 years 16 days ago
Implementing MPI-IO Atomic Mode and Shared File Pointers Using MPI One-Sided Communication
The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of a variety of underlying storage targets. These targets vary widely in their ca...
Robert Latham, Robert B. Ross, Rajeev Thakur
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 16 days ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang