Sciweavers

2086 search results - page 145 / 418
» Mathematical Theory Exploration
Sort
View
115
Voted
PCM
2001
Springer
112views Multimedia» more  PCM 2001»
15 years 8 months ago
Correlation Detection of Asymmetric Watermark
Abstract. This paper proposes a novel method to detect Furon’s asymmetric watermark by using a correlation detector that is mathematically tractable and simple. The performance o...
Jin S. Seo, Chang D. Yoo
ICSE
1994
IEEE-ACM
15 years 7 months ago
On the Inference of Configuration Structures from Source Code
We apply mathematical concept analysis to the problem of infering configuration structures from existing source code. Concept analysis has been developed by German mathematicians ...
Maren Krone, Gregor Snelting
105
Voted
FSTTCS
2000
Springer
15 years 7 months ago
Combining Semantics with Non-standard Interpreter Hierarchies
This paper reports on results concerning the combination of non-standard semantics via interpreters. We define what a semantics combination means and identify under which condition...
Sergei M. Abramov, Robert Glück
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 3 months ago
Free deconvolution for signal processing applications
—Situations in many fields of research, such as digital communications, nuclear physics and mathematical finance, can be modelled with random matrices. When the matrices get la...
Øyvind Ryan, Mérouane Debbah
140
Voted
JSAC
2006
180views more  JSAC 2006»
15 years 3 months ago
A Tutorial on Decomposition Methods for Network Utility Maximization
A systematic understanding of the decomposability structures in network utility maximization is key to both resource allocation and functionality allocation. It helps us obtain the...
Daniel Pérez Palomar, Mung Chiang