Sciweavers

1368 search results - page 106 / 274
» The Implicit Pipeline Method
Sort
View
TIFS
2008
179views more  TIFS 2008»
13 years 10 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
TVLSI
2008
151views more  TVLSI 2008»
13 years 10 months ago
Guest Editorial Special Section on Design Verification and Validation
ion levels. The framework also supports the generation of test constraints, which can be satisfied using a constraint solver to generate tests. A compositional verification approac...
I. Harris, D. Pradhan
NAR
2007
102views more  NAR 2007»
13 years 9 months ago
ProtSweep, 2Dsweep and DomainSweep: protein analysis suite at DKFZ
The wealth of transcript information that has been made publicly available in recent years has led to large pools of individual web sites offering access to bioinformatics softwar...
Coral del Val, Peter Ernst, Mechthild Falkenhahn, ...
VC
2010
182views more  VC 2010»
13 years 8 months ago
Color invariant chroma keying and color spill neutralization for dynamic scenes and cameras
Abstract In this article we show, how temporal backdrops that alternately change their color rapidly at recording rate can aid chroma keying by transforming color spill into a neut...
Anselm Grundhöfer, Daniel Kurz, Sebastian Thi...
CIKM
2011
Springer
12 years 10 months ago
Joint inference for cross-document information extraction
Previous information extraction (IE) systems are typically organized as a pipeline architecture of separated stages which make independent local decisions. When the data grows bey...
Qi Li, Sam Anzaroot, Wen-Pin Lin, Xiang Li, Heng J...