Sciweavers

506 search results - page 79 / 102
» Infrastructure Components for Large-Scale Information Extrac...
Sort
View
IJDET
2010
130views more  IJDET 2010»
13 years 4 months ago
A Unified Learning Style Model for Technology-Enhanced Learning: What, Why and How?
: This paper deals with the use of learning styles in technology-enhanced learning, by introducing a so-called "Unified Learning Style Model" (ULSM). The article aims at ...
Elvira Popescu
IWANN
2005
Springer
14 years 1 months ago
Characterizing Self-developing Biological Neural Networks: A First Step Towards Their Application to Computing Systems
Carbon nanotubes are often seen as the only alternative technology to silicon transistors. While they are the most likely short-term alternative, other longer-term alternatives sho...
Hugues Berry, Olivier Temam
IH
1998
Springer
13 years 11 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Object Recognition and Recovery by Skeleton Graph Matching
This paper presents a robust and efficient skeleton-based graph matching method for object recognition and recovery applications. The novel feature is to unify both object recogni...
Lei He, Chia Y. Han, William G. Wee
TIFS
2008
142views more  TIFS 2008»
13 years 7 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...