Sciweavers

1156 search results - page 125 / 232
» Compositional Methods for Information-Hiding
Sort
View
INFSOF
2006
129views more  INFSOF 2006»
13 years 9 months ago
An interactive service customization model
: Mass customization has become one of the key strategies for a service provider to differentiate itself from its competitors in a highly segmented global service market. This pape...
Jian Cao, Jie Wang, Kincho H. Law, Shen-sheng Zhan...
PAMI
2008
147views more  PAMI 2008»
13 years 9 months ago
Image Stitching Using Structure Deformation
The aim of this paper is to achieve seamless image stitching without producing visual artifact caused by severe intensity discrepancy and structure misalignment, given that the inp...
Jiaya Jia, Chi-Keung Tang
TASLP
2008
134views more  TASLP 2008»
13 years 9 months ago
Semantic Role Labeling Using a Grammar-Driven Convolution Tree Kernel
Convolution tree kernel has shown promising results in semantic role labeling (SRL). However, this kernel does not consider much linguistic knowledge in kernel design and only perf...
Min Zhang, Wanxiang Che, Guodong Zhou, AiTi Aw, Ch...
IS
2007
13 years 9 months ago
Formalizing the evolution of virtual communities
Collaboration increasingly takes place in virtual communities using the Internet. These communities are socio-technical systems that tend to evolve strongly and become more comple...
Aldo de Moor, Hans Weigand
TVLSI
2008
151views more  TVLSI 2008»
13 years 9 months ago
Guest Editorial Special Section on Design Verification and Validation
ion levels. The framework also supports the generation of test constraints, which can be satisfied using a constraint solver to generate tests. A compositional verification approac...
I. Harris, D. Pradhan