Sciweavers

7504 search results - page 285 / 1501
» Computing with Action Potentials
Sort
View
112
Voted
ISW
2007
Springer
15 years 8 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
116
Voted
ICDAR
2005
IEEE
15 years 8 months ago
Distinguishing Mathematics Notation from English Text using Computational Geometry
A trainable method for distinguishing between mathematics notation and natural language (here, English) in images of textlines, using computational geometry methods only with no a...
Derek M. Drake, Henry S. Baird
117
Voted
ICFCA
2005
Springer
15 years 8 months ago
On Computing the Minimal Generator Family for Concept Lattices and Icebergs
Minimal generators (or mingen) constitute a remarkable part of the closure space landscape since they are the antipodes of the closures, i.e., minimal sets in the underlying equiva...
Kamal Nehmé, Petko Valtchev, Mohamed Rouane...
HUC
2003
Springer
15 years 7 months ago
Context-Aware Computing with Sound
We propose audio networking: using ubiquitously available sound hardware (i.e. speakers, sound-cards and microphones) for lowbandwidth, wireless networking. A variety of location- ...
Anil Madhavapeddy, David Scott, Richard Sharp
125
Voted
FCCM
2002
IEEE
174views VLSI» more  FCCM 2002»
15 years 7 months ago
PAM-Blox II: Design and Evaluation of C++ Module Generation for Computing with FPGAs
This paper explores the implications of integrating flexible module generation into a compiler for FPGAs. The objective is to improve the programmabilityof FPGAs, or in other wor...
Oskar Mencer