Sciweavers

4790 search results - page 24 / 958
» Reverse Query Processing
Sort
View
ICIP
2006
IEEE
14 years 1 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
WCRE
2008
IEEE
14 years 1 months ago
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas
Data modeling is an essential part of the software development process, and together with application modeling forms the core of the model-driven approach to software engineering....
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
14 years 9 months ago
Query Folding
Query folding refers to the activity of determining if and how a query can be answered using a given set of resources, which might be materialized views, cached results of previou...
Xiaolei Qian
BMVC
2000
13 years 9 months ago
Parallel Chains, Delayed Rejection and Reversible Jump MCMC for Object Recognition
We tackle the problem of object recognition using a Bayesian approach. A marked point process [1] is used as a prior model for the (unknown number of) objects. A sample is generat...
M. Harkness, P. Green
WCRE
2008
IEEE
14 years 1 months ago
A Business Process Explorer: Recovering Business Processes from Business Applications
A business process contains a set of logically related tasks executed to fulfill business goals. Business applications enable organizations to automatically perform their daily op...
Jin Guo, Ying Zou