Sciweavers

2236 search results - page 272 / 448
» Intrusion detection techniques and approaches
Sort
View
ICIP
2006
IEEE
15 years 12 days ago
Ghost Removal in High Dynamic Range Images
High dynamic range images may be created by capturing multiple images of a scene with varying exposures. Images created in this manner are prone to ghosting artifacts, which appea...
Ahmet Oguz Akyüz, Erik Reinhard, Erum Arif Kh...
SCIA
2007
Springer
129views Image Analysis» more  SCIA 2007»
14 years 4 months ago
Efficiently Capturing Object Contours for Non-Photorealistic Rendering
Non-photorealistic rendering (NPR) techniques aim to outline the shape of objects and reduce visual clutter such as shadows and inner texture edges. As the first phase result of ou...
Jiyoung Park, Juneho Yi
COMPSAC
2006
IEEE
14 years 4 months ago
Test Case Prioritization Using Relevant Slices
Software testing and retesting occurs continuously during the software development lifecycle to detect errors as early as possible. The sizes of test suites grow as software evolv...
Dennis Jeffrey, Neelam Gupta
ISSRE
2003
IEEE
14 years 4 months ago
An Empirical Study on Testing and Fault Tolerance for Software Reliability Engineering
Software testing and software fault tolerance are two major techniques for developing reliable software systems, yet limited empirical data are available in the literature to eval...
Michael R. Lyu, Zubin Huang, Sam K. S. Sze, Xia Ca...
FCCM
2000
IEEE
131views VLSI» more  FCCM 2000»
14 years 3 months ago
A Reliable LZ Data Compressor on Reconfigurable Coprocessors
Data compression techniques based on Lempel-Ziv (LZ) algorithm are widely used in a variety of applications, especially in data storage and communications. However, since the LZ a...
Wei-Je Huang, Nirmal R. Saxena, Edward J. McCluske...