Sciweavers

2984 search results - page 558 / 597
» Method engineering process patterns
Sort
View
IJNSEC
2007
143views more  IJNSEC 2007»
13 years 8 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
TIP
1998
103views more  TIP 1998»
13 years 8 months ago
Orientation diffusions
Abstract—Diffusions are useful for image processing and computer vision because they provide a convenient way of smoothing noisy data, analyzing images at multiple scales, and en...
Pietro Perona
EWC
2010
91views more  EWC 2010»
13 years 7 months ago
Multiobjective global surrogate modeling, dealing with the 5-percent problem
When dealing with computationally expensive simulation codes or process measurement data, surrogate modeling methods are firmly established as facilitators for design space explor...
Dirk Gorissen, Ivo Couckuyt, Eric Laermans, Tom Dh...
TIP
2010
150views more  TIP 2010»
13 years 7 months ago
Study of Subjective and Objective Quality Assessment of Video
Abstract—We present the results of a recent large-scale subjective study of video quality on a collection of videos distorted by a variety of application-relevant processes. Meth...
Kalpana Seshadrinathan, Rajiv Soundararajan, Alan ...
WS
2010
ACM
13 years 7 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel