Sciweavers

987 search results - page 169 / 198
» Key Characteristics of Hymns
Sort
View
GRAPHICSINTERFACE
2001
15 years 5 months ago
Aiding Manipulation of Handwritten Mathematical Expressions through Style-Preserving Morphs
We describe a technique for enhancing a user's ability to manipulate hand-printed symbolic information by automatically improving legibility and simultaneously providing imme...
Richard Zanibbi, Kevin Novins, James Arvo, Katheri...
ICISC
2001
162views Cryptology» more  ICISC 2001»
15 years 5 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
ISCAPDCS
2001
15 years 5 months ago
AMOS-SDDS: A Scalable Distributed Data Manager for Windows Multicomputers
Known parallel DBMS offer at present only static partitioning schemes. Adding a storage node is then a cumbersome operation that typically requires the manual data redistribution....
Yakham Ndiaye, Aly Wane Diene, Witold Litwin, Tore...
NIPS
2004
15 years 5 months ago
Reducing Spike Train Variability: A Computational Theory Of Spike-Timing Dependent Plasticity
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron ...
Sander M. Bohte, Michael C. Mozer
SSWMC
2004
15 years 5 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp