Sciweavers

1466 search results - page 143 / 294
» Completeness of the Authentication Tests
Sort
View
JTAER
2008
80views more  JTAER 2008»
13 years 8 months ago
Web 2.0 as Syndication
There is considerable excitement about the notion of 'Web 2.0', particularly among Internet businesspeople. In contrast, there is an almost complete lack of formal liter...
Roger Clarke
JUCS
2006
92views more  JUCS 2006»
13 years 8 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
SAC
2008
ACM
13 years 7 months ago
Adding background knowledge to formal concept analysis via attribute dependency formulas
We present a way to add user's background knowledge to formal concept analysis. The type of background knowledge we deal with relates to relative importance of attributes in ...
Radim Belohlávek, Vilém Vychodil
ICIP
2009
IEEE
13 years 5 months ago
Blind deblurring of foreground-background images
This paper presents a method for deblurring an image consisting of two layers (a foreground layer and a background layer) which have suffered different, unknown blurs. This is a s...
Mariana S. C. Almeida, Luis B. Almeida
ICASSP
2011
IEEE
12 years 11 months ago
A novel study and analysis on segmental gait sequence recognition
This paper presents a novel study and analysis on two important problems in gait recognition: one is how to perform gait recognition with only segment of a complete gait cycle for...
Nini Liu, Yap-Peng Tan