Sciweavers

2384 search results - page 340 / 477
» Analyzing Requirements Engineering Processes: A Case Study
Sort
View
DGO
2011
302views Education» more  DGO 2011»
14 years 4 months ago
An ontology-based interactive tool to search documents in the U.S. patent system
The past few years have seen an explosive growth in scientific and regulatory documents related to the patent system. Relevant information is siloed into many heterogeneous and di...
Siddharth Taduri, Gloria T. Lau, Kincho H. Law, Ha...
PAMI
2012
13 years 6 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
ICIP
2005
IEEE
16 years 6 months ago
System analysis of VLSI architecture for motion-compensated temporal filtering
The Motion-Compensated Temporal Filtering (MCTF) is an innovative prediction scheme for video coding and has become the core technology of the coming video coding standard, MPEG21...
Ching-Yeh Chen, Chao-Tsung Huang, Yi-Hua Chen, Chu...
CCIA
2009
Springer
15 years 5 months ago
On in-vitro and in-vivo IVUS data fusion
Abstract. The design and the validation of an automatic plaque characterization technique based on Intravascular Ultrasound (IVUS) usually requires a data ground-truth. The histolo...
Francesco Ciompi, Oriol Pujol, Oriol Rodriguez-Leo...
IWIA
2005
IEEE
15 years 9 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan