Sciweavers

603 search results - page 107 / 121
» Embedded Formulas Extraction
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
13 years 2 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
TII
2010
146views Education» more  TII 2010»
13 years 2 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
CVPR
2011
IEEE
12 years 11 months ago
Discriminative Spatial Pyramid
Spatial Pyramid Representation (SPR) is a widely used method for embedding both global and local spatial information into a feature, and it shows good performance in terms of gene...
Tatsuya Harada, Yoshitaka Ushiku, Yuya Yamashita, ...
CVPR
2008
IEEE
14 years 9 months ago
Robust 3D face recognition in uncontrolled environments
Most current 3D face recognition algorithms are designed based on the data collected in controlled situations, which leads to the un-guaranteed performance in practical systems. I...
Cheng Zhong, Zhenan Sun, Tieniu Tan, Zhaofeng He
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 7 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...