Sciweavers

868 search results - page 162 / 174
» Using concept analysis to detect co-change patterns
Sort
View
SC
2003
ACM
14 years 1 months ago
Identifying and Exploiting Spatial Regularity in Data Memory References
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
CCS
2006
ACM
14 years 4 days ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
CASON
2009
IEEE
14 years 3 months ago
Social Aspects of Web Page Contents
In this paper we try to consider a Web page as information with social aspects. Each Web page is the result of invisible social interaction. This interaction between different gro...
Milos Kudelka, Václav Snásel, Zdenek...
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
14 years 1 months ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
ARTCOM
2009
IEEE
14 years 1 months ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna