Sciweavers

2620 search results - page 444 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
GEOINFORMATICA
2002
136views more  GEOINFORMATICA 2002»
13 years 9 months ago
Tabu Search Heuristic for Point-Feature Cartographic Label Placement
The generation of better label placement configurations in maps is a problem that comes up in automated cartographic production. The objective of a good label placement is to displ...
Missae Yamamoto, Gilberto Câmara, Luiz Anton...
TIT
1998
69views more  TIT 1998»
13 years 8 months ago
Relationships Between the Constant Modulus and Wiener Receivers
— The Godard or the constant modulus algorithm (CMA) is an effective technique for blind receiver design in communications. However, due to the complexity of the Constant Modulus...
Hanks H. Zeng, Lang Tong, C. Richard Johnson Jr.
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
13 years 8 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
SQJ
2002
106views more  SQJ 2002»
13 years 8 months ago
Energy Metric for Software Systems
Acknowledging the intense requirement for low power operation in most portable computing systems, this paper introduces the notion of energy efficient software design and proposes ...
Alexander Chatzigeorgiou, George Stephanides
TCSV
2002
161views more  TCSV 2002»
13 years 8 months ago
Blocking artifact detection and reduction in compressed data
A novel frequency-domain technique for image blocking artifact detection and reduction is presented in this paper. The algorithm first detects the regions of the image which presen...
George A. Triantafyllidis, Dimitrios Tzovaras, Mic...