Sciweavers

239 search results - page 26 / 48
» el 2008
Sort
View
ICIP
2008
IEEE
14 years 4 months ago
A fuzzy approach for background subtraction
Background Subtraction is a widely used approach to detect moving objects from static cameras. Many different methods have been proposed over the recent years and can be classifi...
Fida El Baf, Thierry Bouwmans, Bertrand Vachon
RECONFIG
2008
IEEE
198views VLSI» more  RECONFIG 2008»
14 years 4 months ago
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
– We have implemented in FPGA recently published class of public key algorithms – MQQ, that are based on quasigroup string transformations. Our implementation achieves decrypti...
Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Kna...
WECWIS
2008
IEEE
98views ECommerce» more  WECWIS 2008»
14 years 4 months ago
Visualizing Compositions of Services from Large Repositories
Creating a Service-Oriented Architecture requires the identification of services to be composed together in order to solve a given need. Currently, software engineers perform thi...
Marco Aiello, Johan van Benthem, Elie el Khoury
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
Bounds on Codes Based on Graph Theory
"THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD" Let Aq(n, d) be the maximum order (maximum number of codewords) of a q-ary code of length n and Hamming distance at l...
Salim Y. El Rouayheb, Costas N. Georghiades, Emina...
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 10 months ago
Justifications for Logic Programs under Answer Set Semantics
The paper introduces the notion of off-line justification for Answer Set Programming (ASP). Justifications provide a graph-based explanation of the truth value of an atom w.r.t. a ...
Enrico Pontelli, Tran Cao Son, Omar El-Khatib