Sciweavers

628 search results - page 31 / 126
» Magic Counting Methods
Sort
View
VLSID
2004
IEEE
107views VLSI» more  VLSID 2004»
14 years 8 months ago
Performance Analysis of Inter Cluster Communication Methods in VLIW Architecture
With increasing demands for high performance by embedded systems, especially by digital signal processing applications, embedded processors must increase available instruction lev...
Sourabh Saluja, Anshul Kumar
ICASSP
2009
IEEE
14 years 2 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
ICSM
2009
IEEE
14 years 2 months ago
Using method stereotype distribution as a signature descriptor for software systems
Method stereotype distribution is used as a signature for software systems. The stereotype for each method is determined using a presented taxonomy. The counts of the different st...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
NAA
2000
Springer
88views Mathematics» more  NAA 2000»
13 years 11 months ago
Schwarz Methods for Convection-Diffusion Problems
Abstract. Various variants of Schwarz methods for a singularly perturbed two dimensional stationary convection-diffusion problem are constructed and analysed. The iteration counts,...
H. MacMullen, Eugene O'Riordan, Grigorii I. Shishk...
NIPS
2003
13 years 9 months ago
An MCMC-Based Method of Comparing Connectionist Models in Cognitive Science
Despite the popularity of connectionist models in cognitive science, their performance can often be difficult to evaluate. Inspired by the geometric approach to statistical model ...
Woojae Kim, Daniel J. Navarro, Mark A. Pitt, In Ja...