Sciweavers

1342 search results - page 239 / 269
» Ordered Programs as Abductive Systems
Sort
View
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 6 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
COMPSAC
2010
IEEE
13 years 3 months ago
Metamodel Recovery from Multi-tiered Domains Using Extended MARS
With the rapid development of model-driven engineering (MDE), domain-specific modeling has become a widely used software development technique. In MDE, metamodels represent a schem...
Qichao Liu, Barrett R. Bryant, Marjan Mernik
ICASSP
2011
IEEE
13 years 12 days ago
Recent development of discriminative training using non-uniform criteria for cross-level acoustic modeling
In this paper, we extend our previous study on discriminative training using non-uniform criteria for speech recognition. The work will put emphasis on how the acoustic modeling i...
Chao Weng, Biing-Hwang Juang
CSE
2011
IEEE
12 years 8 months ago
Performance Enhancement of Network Devices with Multi-Core Processors
— In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many othe...
Nhat-Phuong Tran, Sugwon Hong, Myungho Lee, Seung-...
ASPDAC
2012
ACM
253views Hardware» more  ASPDAC 2012»
12 years 4 months ago
An integrated and automated memory optimization flow for FPGA behavioral synthesis
Behavioral synthesis tools have made significant progress in compiling high-level programs into register-transfer level (RTL) specifications. But manually rewriting code is still ...
Yuxin Wang, Peng Zhang, Xu Cheng, Jason Cong