Sciweavers

2027 search results - page 131 / 406
» On Performance Evaluation of Face Detection and Localization...
Sort
View
IJNM
2008
131views more  IJNM 2008»
13 years 9 months ago
Using temporal correlation for fault localization in dynamically changing networks
A mobile ad-hoc network creates a dynamic environment where node mobility can cause periodic changes in routes. Most existing fault localization algorithms assume availability of ...
Maitreya Natu, Adarshpal S. Sethi
ASPDAC
2004
ACM
107views Hardware» more  ASPDAC 2004»
14 years 2 months ago
Minimization of the expected path length in BDDs based on local changes
— In many verification tools methods for functional simulation based on reduced ordered Binary Decision Diagrams (BDDs) are used. The evaluation time for a BDD can be crucial an...
Rüdiger Ebendt, Wolfgang Günther, Rolf D...
SSWMC
2004
13 years 10 months ago
Quantitative evaluation of pairs and RS steganalysis
We give initial results from a new project which performs statistically accurate evaluation of the reliability of image steganalysis algorithms. The focus here is on the Pairs and...
Andrew D. Ker
INFOSCALE
2007
ACM
13 years 10 months ago
A distributed incremental nearest neighbor algorithm
Searching for non-text data (e.g., images) is mostly done by means of metadata annotations or by extracting the text close to the data. However, supporting real content-based audi...
Fabrizio Falchi, Claudio Gennaro, Fausto Rabitti, ...
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
14 years 9 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen