Sciweavers

953 search results - page 44 / 191
» Constraint Based Transformation Theory
Sort
View
CCS
2007
ACM
14 years 4 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
ICDE
2003
IEEE
134views Database» more  ICDE 2003»
14 years 11 months ago
Propagating XML Constraints to Relations
We present a technique for refining the design of relational storage for XML data based on XML key propagation. Three algorithms are presented: one checks whether a given function...
Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Jin...
CORR
2006
Springer
146views Education» more  CORR 2006»
13 years 10 months ago
The Haar Wavelet Transform of a Dendrogram
While there is a very long tradition of approximating a data array by projecting row or column vectors into a lower dimensional subspace the direct approximation of a data matrix ...
Fionn Murtagh
MM
2004
ACM
104views Multimedia» more  MM 2004»
14 years 3 months ago
A robust and accumulator-free ellipse hough transform
The ellipse Hough transform (EHT) is a widely-used technique. Most of the previous modifications to the standard EHT improved either the voting procedure that computes the absolut...
Xinguo Yu, Hon Wai Leong, Changsheng Xu, Qi Tian
ISCIS
2003
Springer
14 years 3 months ago
Improved POCS-Based De-blocking Algorithm for Block-Transform Compressed Images
This paper presents a postprocessing technique based on the theory of projections onto convex sets (POCS) to reduce the blocking artifacts in low bit rate BDCT-coded images. In the...
Yoon Kim, Chun-Su Park, Kyunghun Jang, Sung-Jea Ko