Sciweavers

4636 search results - page 204 / 928
» Modelling and Validation with VipTool
Sort
View
PR
2006
127views more  PR 2006»
13 years 8 months ago
Unsupervised possibilistic clustering
In fuzzy clustering, the fuzzy c-means (FCM) clustering algorithm is the best known and used method. Since the FCM memberships do not always explain the degrees of belonging for t...
Miin-Shen Yang, Kuo-Lung Wu
ICCV
2005
IEEE
14 years 10 months ago
Mutual Information Regularized Bayesian Framework for Multiple Image Restoration
to appear in Proc. IEEE International Conference on Computer Vision (ICCV), 2005 Bayesian methods have been extensively used in various applications. However, there are two intrin...
Yunqiang Chen, Hongcheng Wang, Tong Fang, Jason Ty...
EUROPKI
2007
Springer
13 years 12 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
13 years 8 months ago
Worry-free database upgrades: automated model-driven evolution of schemas and complex mappings
Schema evolution is an unavoidable consequence of the application development lifecycle. The two primary schemas in an application, the client conceptual object model and the pers...
James F. Terwilliger, Philip A. Bernstein, Adi Unn...
ETS
2007
IEEE
91views Hardware» more  ETS 2007»
14 years 2 months ago
PPM Reduction on Embedded Memories in System on Chip
This paper summarizes advanced test patterns designed to target dynamic and time-related faults caused by new defect mechanisms in deep-submicron memory technologies. Such tests a...
Said Hamdioui, Zaid Al-Ars, Javier Jiménez,...