Sciweavers

961 search results - page 174 / 193
» Visual Cryptography on Graphs
Sort
View
VL
2005
IEEE
14 years 1 months ago
Transformation of UML State Machines for Direct Execution
Executable UML models are nowadays gaining interest in embedded systems design. This domain is strongly devoted to the modeling of reactive behavior using StateChart variants. In ...
Tim Schattkowsky, Wolfgang Müller 0003
MIR
2004
ACM
153views Multimedia» more  MIR 2004»
14 years 1 months ago
Clip-based similarity measure for hierarchical video retrieval
This paper proposes a new approach and algorithm for the similarity measure of video clips. The similarity is mainly based on two bipartite graph matching algorithms: maximum matc...
Yuxin Peng, Chong-Wah Ngo
ICCS
2004
Springer
14 years 1 months ago
An Exportable CGIF Module from the CP Environment: A Pragmatic Approach
We have upgraded the Conceptual Programming Environment (CP) from a single standalone application to a set of component modules to increase flexibility of the environment and to a...
Heather D. Pfeiffer
WCRE
2003
IEEE
14 years 1 months ago
Analyzing Large Spreadsheet Programs
Although the results of spreadsheet programs are the base for very important decisions and are subject to many changes, they are only poorly documented. In this paper we introduce...
Markus Clermont
ASYNC
1998
IEEE
110views Hardware» more  ASYNC 1998»
14 years 10 days ago
Analyzing Specifications for Delay-Insensitive Circuits
We present the XDI Model for specifying delay-insensitive circuits, that is, reactive systems that correctly exchange signals with their environment in spite of unknown delays inc...
Tom Verhoeff