Sciweavers

886 search results - page 58 / 178
» Generalized Bezout Identity
Sort
View
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Analysis of Hierarchical B Pictures and MCTF
In this paper, an investigation of H.264/MPEG4-AVC conforming coding with hierarchical B pictures is presented. We analyze the coding delay and memory requirements, describe detai...
Heiko Schwarz, Detlev Marpe, Thomas Wiegand
MINENET
2005
ACM
14 years 2 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
ISAAC
2005
Springer
78views Algorithms» more  ISAAC 2005»
14 years 2 months ago
The Phase Matrix
Reducing the error of quantum algorithms is often achieved by applying a primitive called amplitude amplification. Its use leads in many instances to quantum algorithms that are q...
Peter Høyer
CAIP
2003
Springer
133views Image Analysis» more  CAIP 2003»
14 years 2 months ago
Automatic Segmentation of Diatom Images
A general framework for automatic segmentation of diatom images is presented. This segmentation is a critical first step in contour-based methods for automatic identification of ...
Andrei Jalba, Jos B. T. M. Roerdink
ICSE
1999
IEEE-ACM
14 years 1 months ago
Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures
Architecture Definition Languages (ADLs) enable the formalization of the architecture of software systems and the execution of preliminary analyses on them. These analyses aim at...
Elisabetta Di Nitto, David S. Rosenblum