Sciweavers

374 search results - page 67 / 75
» Measuring Information Leakage Using Generalized Gain Functio...
Sort
View
MSR
2005
ACM
14 years 1 months ago
Analysis of signature change patterns
Software continually changes due to performance improvements, new requirements, bug fixes, and adaptation to a changing operational environment. Common changes include modificatio...
Sunghun Kim, E. James Whitehead Jr., Jennifer Beva...
VLDB
2001
ACM
92views Database» more  VLDB 2001»
13 years 12 months ago
Fast Evaluation Techniques for Complex Similarity Queries
Complex similarity queries, i.e., multi-feature multi-object queries, are needed to express the information need of a user against a large multimedia repository. Even if a user in...
Klemens Böhm, Michael Mlivoncic, Hans-Jö...
ICASSP
2007
IEEE
13 years 11 months ago
Relevance Network Modeling for Muscle Association Pattern in Reaching Movements
Our purpose is to study how different muscles collaborate together to efficiently create a smooth, coordinated reaching movement. In the EMG literature, it has been commonplace to...
Z. Jane Wang, Martin J. McKeown
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 7 months ago
Lower bounds for the error decay incurred by coarse quantization schemes
Several analog-to-digital conversion methods for bandlimited signals used in applications, such as quantization schemes, employ coarse quantization coupled with oversampling. The...
Felix Krahmer, Rachel Ward
IOT
2010
13 years 4 months ago
Evaluation of 1D barcode scanning on mobile phones
Abstract--1D or linear barcodes are the black-and-whitestriped codes that can be found on most consumer products. This work evaluates existing 1D barcode scanners for mobile phones...
Felix von Reischach, Stephan Karpischek, Florian M...