Sciweavers

670 search results - page 92 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
TCOM
2008
63views more  TCOM 2008»
13 years 7 months ago
A general construction of constrained parity-check codes for optical recording
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
Kui Cai, Kees A. Schouhamer Immink
TIT
2010
111views Education» more  TIT 2010»
13 years 2 months ago
Directly lower bounding the information capacity for channels with I.I.D.deletions and duplications
We directly lower bound the information capacity for channels with i.i.d. deletions and duplications. Our approach differs from previous work in that we focus on the information ca...
Adam Kirsch, Eleni Drinea
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 2 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
DAWAK
2008
Springer
13 years 9 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
MVA
2007
211views Computer Vision» more  MVA 2007»
13 years 9 months ago
Shadow Elimination in Traffic Video Segmentation
Shadow detection is critical for robust and reliable vision-based systems for traffic vision analysis. Shadow points are often misclassified as object points causing errors in loc...
Hong Liu, Jintao Li, Qun Liu, Yueliang Qian