Sciweavers

663 search results - page 115 / 133
» Applying Two New Methods to the Teaching of Computer Archite...
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
ICASSP
2011
IEEE
13 years 27 days ago
Frequency selective pitch transposition of audio signals
Modern music production often uses pre-recorded pieces of audio, so-called samples, taken from a huge sample database. Consequently, there is an increasing demand to extensively a...
Sascha Disch, Bernd Edler
ECCV
2004
Springer
14 years 11 months ago
A Robust Algorithm for Characterizing Anisotropic Local Structures
This paper proposes a robust estimation and validation framework for characterizing local structures in a positive multi-variate continuous function approximated by a Gaussian-base...
Kazunori Okada, Dorin Comaniciu, Navneet Dalal, Ar...
VCIP
2001
199views Communications» more  VCIP 2001»
13 years 10 months ago
Estimation of large-amplitude motion and disparity fields: application to intermediate view reconstruction
This paper describes a method for establishing dense correspondence between two images in a video sequence (motion) or in a stereo pair (disparity) in case of large displacements....
Moustapha Kardouchi, Janusz Konrad, Carlos V&aacut...
BMCBI
2010
112views more  BMCBI 2010»
13 years 9 months ago
Orientation-dependent backbone-only residue pair scoring functions for fixed backbone protein design
Background: Empirical scoring functions have proven useful in protein structure modeling. Most such scoring functions depend on protein side chain conformations. However, backbone...
Andrew J. Bordner