Sciweavers

1885 search results - page 15 / 377
» Optimization of Component Connections for an Embedded Compon...
Sort
View
AIRWEB
2009
Springer
14 years 2 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer
DAS
2006
Springer
13 years 11 months ago
Bangla/English Script Identification Based on Analysis of Connected Component Profiles
Script identification is required for a multilingual OCR system. In this paper, we present a novel and efficient technique for Bangla/English script identification with application...
Lijun Zhou, Yue Lu, Chew Lim Tan
FDL
2007
IEEE
13 years 11 months ago
Transactor-based Formal Verification of Real-time Embedded Systems
With the increasing complexity of today's embedded systems, there is a need to formally verify such designs at mixed abstraction levels. This is needed if some compoe describ...
Daniel Karlsson, Petru Eles, Zebo Peng
CVIU
2010
267views more  CVIU 2010»
13 years 5 months ago
Accelerated hardware video object segmentation: From foreground detection to connected components labelling
This paper demonstrates the use of a single-chip FPGA for the segmentation of moving objects in a video sequence. The system maintains highly accurate background models, and integ...
Kofi Appiah, Andrew Hunter, Patrick Dickinson, Hon...
JUCS
2008
144views more  JUCS 2008»
13 years 7 months ago
Embedded Software Revitalization through Component Mining and Software Product Line Techniques
: The mining of generic software components from legacy systems can be used as an auxiliary technique to revitalize systems. This paper presents a software maintenance approach tha...
Marcelo A. Ramos, Rosângela Dellosso Pentead...