Sciweavers

8135 search results - page 1521 / 1627
» network 2008
Sort
View
178
Voted
CVPR
2008
IEEE
15 years 5 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
144
Voted
DAC
2008
ACM
15 years 5 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
124
Voted
DAGM
2008
Springer
15 years 5 months ago
Natural Language Understanding by Combining Statistical Methods and Extended Context-Free Grammars
This paper introduces an novel framework for speech understanding using extended context-free grammars (ECFGs) by combining statistical methods and rule based knowledge. By only us...
Stefan Schwärzler, Joachim Schenk, Frank Wall...
127
Voted
DAWAK
2008
Springer
15 years 5 months ago
Adapting LDA Model to Discover Author-Topic Relations for Email Analysis
Analyzing the author and topic relations in email corpus is an important issue in both social network analysis and text mining. The AuthorTopic model is a statistical model that id...
Liqiang Geng, Hao Wang, Xin Wang, Larry Korba
153
Voted
DAWAK
2008
Springer
15 years 5 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
« Prev « First page 1521 / 1627 Last » Next »