Sciweavers

2624 search results - page 35 / 525
» The 2LIP model and its implementations
Sort
View
ITICSE
2006
ACM
14 years 1 months ago
Implementing the jigsaw model in CS1 closed labs
We apply the Jigsaw cooperative learning model to our CS1 closed labs. The Jigsaw cooperative learning model assigns students into main groups in which each group member is respon...
Leen-Kiat Soh
APCCAS
2006
IEEE
251views Hardware» more  APCCAS 2006»
14 years 1 months ago
Implementation of a H.264 decoder with Template-based Communication Refinement
We described an H.264 decoder implemented with our design methodology, in which a system function model of transaction level is first captured in SystemC and refined into RTL with ...
Sang-yong Yoon, Sanggyu Park, Soolk Chae
ICDE
2002
IEEE
121views Database» more  ICDE 2002»
14 years 9 months ago
Similarity Flooding: A Versatile Graph Matching Algorithm and Its Application to Schema Matching
Matching elements of two data schemas or two data instances plays a key role in data warehousing, e-business, or even biochemical applications. In this paper we present a matching...
Sergey Melnik, Hector Garcia-Molina, Erhard Rahm
ISBI
2007
IEEE
14 years 1 months ago
A Novel Tag Removal Technique for Tagged Cardiac Mri and Its Applications
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu