Sciweavers

5829 search results - page 1000 / 1166
» The Practice of Cluster Analysis
Sort
View
DAC
2010
ACM
15 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICSE
2000
IEEE-ACM
15 years 8 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
ICSR
2000
Springer
15 years 8 months ago
Implementation Issues in Product Line Scoping
Often product line engineering is treated similar to the waterfall model in traditional software engineering, i.e., the different phases (scoping, analysis, architecting, implemen...
Klaus Schmid, Cristina Gacek
PAKDD
2000
ACM
140views Data Mining» more  PAKDD 2000»
15 years 8 months ago
Performance Controlled Data Reduction for Knowledge Discovery in Distributed Databases
The objective of data reduction is to obtain a compact representation of a large data set to facilitate repeated use of non-redundant information with complex and slow learning alg...
Slobodan Vucetic, Zoran Obradovic
136
Voted
CVPR
1997
IEEE
15 years 8 months ago
Empirical Bayesian EM-based Motion Segmentation
A recent trend in motion-based segmentation has been to rely on statistical procedures derived from ExpectationMaximization (EM) principles. EM-based approaches have various attra...
Nuno Vasconcelos, Andrew Lippman
« Prev « First page 1000 / 1166 Last » Next »