Sciweavers

1021 search results - page 135 / 205
» On the correlation of binary sequences
Sort
View
FASE
2003
Springer
15 years 9 months ago
Detecting Implied Scenarios Analyzing Non-local Branching Choices
Scenarios are powerful tools to model and analyze software systems. However, since they do not provide a complete description of the system, but just some possible execution paths,...
Henry Muccini
FGR
1998
IEEE
96views Biometrics» more  FGR 1998»
15 years 8 months ago
Comparisons between Human and Computer Recognition of Faces
This paper reviews characteristics of human face recognition that should be reflected in any psychologically plausible computational model of face recognition. We then summarise r...
Vicki Bruce, A. Mike Burton, Peter J. B. Hancock
IH
1999
Springer
15 years 8 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
DAC
1996
ACM
15 years 8 months ago
Pseudorandom-Pattern Test Resistance in High-Performance DSP Datapaths
The testability of basic DSP datapath structures using pseudorandom built-in self-test techniques is examined. The addition of variance mismatched signals is identified as a testi...
Laurence Goodby, Alex Orailoglu
PADL
2000
Springer
15 years 7 months ago
Calculating a New Data Mining Algorithm for Market Basket Analysis
The general goal of data mining is to extract interesting correlated information from large collection of data. A key computationally-intensive subproblem of data mining involves ...
Zhenjiang Hu, Wei-Ngan Chin, Masato Takeichi