Sciweavers

1525 search results - page 152 / 305
» Matching with Regular Constraints
Sort
View
FMOODS
2006
15 years 5 months ago
Security Issues in Service Composition
Abstract. We use a distributed, enriched -calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICIP
2005
IEEE
16 years 6 months ago
A modified FCM with optimal Peano scans for image segmentation
This paper describes a new method for fuzzy segmentation based on spatial constraints. Taking into account the neighborhood influence two techniques are used. First a new feature ...
Adel Hafiane, Bertrand Zavidovique, Subhasis Chaud...
ICASSP
2009
IEEE
15 years 11 months ago
Robust speech dereverberation based on non-negativity and sparse nature of speech spectrograms
This paper presents a blind dereverberation method designed to recover the subband envelope of an original speech signal from its reverberant version. The problem is formulated as...
Hirokazu Kameoka, Tomohiro Nakatani, Takuya Yoshio...
ISVLSI
2006
IEEE
82views VLSI» more  ISVLSI 2006»
15 years 10 months ago
Optimal Periodical Memory Allocation for Logic-in-Memory Image Processors
One major issue in designing image processors is to design a memory system that supports parallel access with a simple interconnection network. This paper presents a design method...
Masanori Hariyama, Michitaka Kameyama, Yasuhiro Ko...
GMP
2000
IEEE
118views Solid Modeling» more  GMP 2000»
15 years 8 months ago
A System for Constructing Boundary Representation Solid Models from a Two-Dimensional Sketch
This paper describes a system which converts a twodimensional sketch with hidden lines removed of a single polyhedral object into a boundary representation solid model. The system...
P. A. C. Varley, Ralph R. Martin