Sciweavers

396 search results - page 36 / 80
» The missing Wendland functions
Sort
View
XPU
2007
Springer
14 years 2 months ago
Overcoming Brooks' Law
Most programmers are familiar with the notion that adding new resources to a project will most likely slow down progress if not bring it to a complete stop while new team members a...
Kealy Opelt
ACSAC
2006
IEEE
14 years 2 months ago
Anomaly Based Web Phishing Page Detection
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Ying Pan, Xuhua Ding
ETFA
2006
IEEE
14 years 2 months ago
An IEC61499 Execution Environment for an aJile-based Field Device
—The IEC61499 standard is the first step towards the development of the next generation agile manufacturing systems where distribution, interoperability and re-configuration are ...
Kleanthis Thramboulidis, Nikolaos Papakonstantinou
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Spatial Error Concealment Based on Bezier Curves
This paper presents a geometric error concealment scheme for DCT-based image/video data based on the Bezier polynomials (BP). The proposed scheme makes use of the average edge dir...
Rogelio Hasimoto-Beltran, Ashfaq A. Khokhar
ICMCS
2005
IEEE
115views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Detector Design for Parametric Speech Watermarking
Parametric watermarking is effected by modifying the linear predictor coefficients of speech. In this work, the parameter noise is analyzed when watermarked speech is subjected t...
Aparna Gurijala, John R. Deller Jr.