Sciweavers

511 search results - page 44 / 103
» The intrinsic dimensionality of graphs
Sort
View
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 10 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
ICCD
2004
IEEE
115views Hardware» more  ICCD 2004»
14 years 6 months ago
Generating Monitor Circuits for Simulation-Friendly GSTE Assertion Graphs
Formal and dynamic (simulation, emulation, etc.) verification techniques are both needed to deal with the overall challenge of verification. Ideally, the same specification/tes...
Kelvin Ng, Alan J. Hu, Jin Yang
FLAIRS
2003
13 years 11 months ago
Spatially-Aware Information Retrieval with Graph-Based Qualitative Reference Models
Geo-referenced information is used by a growing number of “spatially-aware” tools in different application areas, including tourism, marketing, environmental management, and m...
Thomas Vögele, Christoph Schlieder
CVPR
2009
IEEE
14 years 4 months ago
Image hallucination with feature enhancement
1 Example-based super-resolution recovers missing high frequencies in a magnified image by learning the correspondence between co-occurrence examples at two different resolution le...
Zhiwei Xiong, Xiaoyan Sun, Feng Wu
CSB
2005
IEEE
125views Bioinformatics» more  CSB 2005»
14 years 3 months ago
On Optimizing Distance-Based Similarity Search for Biological Databases
Similarity search leveraging distance-based index structures is increasingly being used for both multimedia and biological database applications. We consider distance-based indexi...
Rui Mao, Weijia Xu, Smriti R. Ramakrishnan, Glen N...