Sciweavers

2990 search results - page 506 / 598
» Thresholding for Change Detection
Sort
View
ICES
2005
Springer
176views Hardware» more  ICES 2005»
14 years 3 months ago
Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration
While the fault repair capability of Evolvable Hardware (EH) approaches have been previously demonstrated, further improvements to fault handling capability can be achieved by exp...
Kening Zhang, Ronald F. DeMara, Carthik A. Sharma
IJCNLP
2005
Springer
14 years 3 months ago
Using Multiple Discriminant Analysis Approach for Linear Text Segmentation
Research on linear text segmentation has been an on-going focus in NLP for the last decade, and it has great potential for a wide range of applications such as document summarizati...
Jingbo Zhu, Na Ye, Xinzhi Chang, Wenliang Chen, Be...
IWDW
2005
Springer
14 years 3 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
SPIN
2005
Springer
14 years 3 months ago
An Incremental Heap Canonicalization Algorithm
Abstract. The most expensive operation in explicit state model checking is the hash computation required to store the explored states in a hash table. One way to reduce this comput...
Madanlal Musuvathi, David L. Dill
UML
2005
Springer
14 years 3 months ago
Exceptional Use Cases
Many exceptional situations arise during the execution of an application. When developing dependable software, the first step is to foresee these exceptional situations and docume...
Aaron Shui, Sadaf Mustafiz, Jörg Kienzle, Chr...