Sciweavers

1096 search results - page 84 / 220
» Computation Slicing: Techniques and Theory
Sort
View
SIAMAM
2002
129views more  SIAMAM 2002»
13 years 8 months ago
Periodic Wavelet Transforms and Periodicity Detection
The theory of periodic wavelet transforms presented here was originally developed to deal with the problem of epileptic seizure prediction. A central theorem in the theory is the c...
Götz E. Pfander, John J. Benedetto
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
14 years 2 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
ICPR
2004
IEEE
14 years 10 months ago
Evaluation of Three Optical Flow-Based Observation Models for Tracking
In this paper, we study the use of optical flow as a characteristic for tracking. We analyze the behavior of three flowbased observation models for particle filter algorithms, and...
José M. Fuertes, Manuel J. Lucena, Nicolas ...
ASPDAC
2009
ACM
135views Hardware» more  ASPDAC 2009»
14 years 3 months ago
Analysis of communication delay bounds for network on chips
—In network-on-chip, computing worst-case delay bound for packet delivery is crucial for designing predictable systems but yet an intractable problem due to complicated resource ...
Yue Qian, Zhonghai Lu, Wenhua Dou
BIRTHDAY
1997
Springer
14 years 1 months ago
Expressive Power of Unary Counters
We compare the expressive power on finite models of two extensions of first order logic L with equality. L(Ct) is formed by adding an operator count{x : ϕ}, which builds a term ...
Michael Benedikt, H. Jerome Keisler