Sciweavers

603 search results - page 83 / 121
» Embedded Formulas Extraction
Sort
View
ICIP
2002
IEEE
14 years 10 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
14 years 10 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
DAC
2008
ACM
14 years 9 months ago
MAPS: an integrated framework for MPSoC application parallelization
In the past few years, MPSoC has become the most popular solution for embedded computing. However, the challenge of programming MPSoCs also comes as the biggest side-effect of the...
Gerd Ascheid, Hanno Scharwächter, Heinrich Me...
ECOOP
2009
Springer
14 years 9 months ago
Stepping Stones over the Refactoring Rubicon
Refactoring tools allow the programmer to pretend they are working with a richer language where the behaviour of a program is automatically preserved during restructuring. In this ...
Mathieu Verbaere, Max Schäfer, Oege de Moor, ...
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
14 years 9 months ago
Compressing Historical Information in Sensor Networks
We are inevitably moving into a realm where small and inexpensive wireless devices would be seamlessly embedded in the physical world and form a wireless sensor network in order t...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...