Sciweavers

5829 search results - page 1004 / 1166
» The Practice of Cluster Analysis
Sort
View
CCS
2008
ACM
15 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CDC
2008
IEEE
188views Control Systems» more  CDC 2008»
15 years 6 months ago
A method for stereo-vision based tracking for robotic applications
Vision based tracking of an object using the ideas of perspective projection inherently consists of nonlinearly modelled measurements although the underlying dynamic system that en...
Pubudu N. Pathirana, Adrian N. Bishop, Andrey V. S...
CIKM
2008
Springer
15 years 6 months ago
Event gazetteers for navigating humanities resources
In history and the other humanities, events and narrative sequences of events are often of primary interest. Yet while named events sometimes appear as subject headings, systems f...
Ryan Shaw
ASPDAC
2005
ACM
118views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Wideband modeling of RF/Analog circuits via hierarchical multi-point model order reduction
This paper proposes a novel wideband modeling technique for high-performance RF passives and linear(ized) analog circuits. The new method is based on a recently proposed sdomain h...
Zhenyu Qi, Sheldon X.-D. Tan, Hao Yu, Lei He
CIKM
2005
Springer
15 years 6 months ago
Fast on-line index construction by geometric partitioning
Inverted index structures are the mainstay of modern text retrieval systems. They can be constructed quickly using off-line mergebased methods, and provide efficient support for ...
Nicholas Lester, Alistair Moffat, Justin Zobel
« Prev « First page 1004 / 1166 Last » Next »