Sciweavers

1805 search results - page 290 / 361
» Computationally Efficient Face Detection
Sort
View
142
Voted
WSC
2007
15 years 6 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
136
Voted
DSD
2005
IEEE
96views Hardware» more  DSD 2005»
15 years 5 months ago
Improvement of the Fault Coverage of the Pseudo-Random Phase in Column-Matching BIST
Several methods improving the fault coverage in mixed-mode BIST are presented in this paper. The test is divided into two phases: the pseudo-random and deterministic. Maximum of f...
Peter Filter, Hana Kubatova
104
Voted
BILDMED
2009
155views Algorithms» more  BILDMED 2009»
15 years 4 months ago
Spatio-temporal Analysis of Unstained Cells In-vitro
Abstract. The tracking of individual cells in time-lapse microscopy facilitates the assessment of certain characteristics of different cell types. Since manual tracking of an adequ...
Nico Scherf, Jens-Peer Kuska, Ulf-Dietrich Brauman...
115
Voted
JSAT
2008
85views more  JSAT 2008»
15 years 3 months ago
Parallel SAT Solving using Bit-level Operations
We show how to exploit the 32/64 bit architecture of modern computers to accelerate some of the algorithms used in satisfiability solving by modifying assignments to variables in ...
Marijn Heule, Hans van Maaren
163
Voted
TCSV
2002
292views more  TCSV 2002»
15 years 3 months ago
Document image segmentation using wavelet scale-space features
In this paper, an efficient and computationally fast method for segmenting text and graphics part of document images based on textural cues is presented. We assume that the graphic...
Mausumi Acharyya, Malay K. Kundu