Sciweavers

1058 search results - page 161 / 212
» It's Doomed; We Can Prove It
Sort
View
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
14 years 4 months ago
Privacy Preserving Clustering on Horizontally Partitioned Data
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. The power of data mining tools to extract hidden information that can...
Ali Inan, Yücel Saygin, Erkay Savas, Ay&ccedi...
APGV
2005
ACM
125views Visualization» more  APGV 2005»
14 years 3 months ago
Designing a tone mapping algorithm for road visibility experiments
In this paper, we propose a tone mapping operator based on a multiscale representation pattern and on thresholds of detection contrast computed for local adaptation luminances. Th...
Justine Grave, Roland Brémond
IEEEMSP
2002
IEEE
137views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
Realtime object extraction and tracking with an active camera using image mosaics
—Moving object extraction plays a key role in applications such as object-based videoconference, surveillance, and so on. The difficulties of moving object segmentation lie in th...
Chia-Wen Lin, Chih-Ming Wang, Yao-Jen Chang, Yung-...
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
14 years 2 months ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi
FM
2006
Springer
161views Formal Methods» more  FM 2006»
14 years 1 months ago
Changing Programs Correctly: Refactoring with Specifications
Refactorings change the internal structure of code without changing its external behavior. For non-trivial refactorings, the preservation of external behavior depends on semantic p...
Fabian Bannwart, Peter Müller