Sciweavers

887 search results - page 174 / 178
» A Pattern for Softcoded Values
Sort
View
TIT
1998
70views more  TIT 1998»
13 years 7 months ago
Reduced-Redundancy Product Codes for Burst Error Correction
In a typical burst-error correction application of a product code of nv nh arrays, one uses an [nh; nh rh] code Ch that detects corrupted rows, and an [nv; nv rv] code Cv that is...
Ron M. Roth, Gadiel Seroussi
PAMI
2007
122views more  PAMI 2007»
13 years 7 months ago
Analyzing Image Structure by Multidimensional Frequency Modulation
—We develop a mathematical framework for quantifying and understanding multidimensional frequency modulations in digital images. We begin with the widely accepted definition of t...
Marios S. Pattichis, Alan C. Bovik
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 6 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
ANTSW
2010
Springer
13 years 5 months ago
Positional Communication and Private Information in Honeybee Foraging Models
Honeybees coordinate foraging efforts across vast areas through a complex system of advertising and recruitment. One mechanism for coordination is the waggle dance, a movement patt...
Peter Bailis, Radhika Nagpal, Justin Werfel
CP
2010
Springer
13 years 5 months ago
An Empirical Study of Optimization for Maximizing Diffusion in Networks
Abstract. We study the problem of maximizing the amount of stochastic diffusion in a network by acquiring nodes within a certain limited budget. We use a Sample Average Approximati...
Kiyan Ahmadizadeh, Bistra N. Dilkina, Carla P. Gom...