Sciweavers

996 search results - page 177 / 200
» Enhancing UML Models: A Domain Analysis Approach
Sort
View
BMCBI
2004
144views more  BMCBI 2004»
13 years 7 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 2 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CAIP
2009
Springer
252views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Incorporating Shape Features in an Appearance-Based Object Detection System
Most object detection techniques discussed in the literature are based solely on texture-based features that capture the global or local appearance of an object. While results indi...
Gurman Gill, Martin Levine
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
14 years 1 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...
VTC
2007
IEEE
14 years 1 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer