Sciweavers

MEMICS
2010
13 years 6 months ago
Modeling Gene Networks using Fuzzy Logic
Recently, almost uncontrolled technological progress allows so called high-throughput data collection for sophisticated and complex experimental biological systems analysis. Espec...
Artur Gintrowski
MEMICS
2010
13 years 6 months ago
Efficient Computation of Morphological Greyscale Reconstruction
Morphological reconstruction is an important image operator from mathematical morphology. It is very often used for filtering, segmentation, and feature extraction. However, its c...
Pavel Karas
MEMICS
2010
13 years 6 months ago
GPU-Based Sample-Parallel Context Modeling for EBCOT in JPEG2000
Embedded Block Coding with Optimal Truncation (EBCOT) is the fundamental and computationally very demanding part of the compression process of JPEG2000 image compression standard. ...
Jiri Matela, Vit Rusnak, Petr Holub
TDSC
2011
13 years 6 months ago
RITAS: Services for Randomized Intrusion Tolerance
— Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and computation complexitie...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
DASIP
2010
13 years 6 months ago
RVC: A multi-decoder CAL Composer tool
The Reconfigurable Video Coding (RVC) framework is a recent ISO standard aiming at providing a unified specification of MPEG video technology in the form of a library of component...
Francesca Palumbo, Danilo Pani, Emanuele Manca, Lu...
DASIP
2010
13 years 6 months ago
RVC-CAL dataflow implementations of MPEG AVC/H.264 CABAC decoding
This paper describes the implementation of the MPEG AVC CABAC entropy decoder using the RVC-CAL dataflow programming language. CABAC is the Context based Adaptive Binary Arithmeti...
Endri Bezati, Marco Mattavelli, Mickaël Raule...
CVIU
2011
13 years 6 months ago
A wearable gaze tracking system for children in unconstrained environments
We present here a head-mounted gaze tracking system for the study of visual behavior in unconstrained environments. The system is designed both for adults and for infants as young...
Basilio Noris, Jean-Baptiste Keller, Aude Billard
TDSC
2011
13 years 6 months ago
Reliability for Networked Storage Nodes
High-end enterprise storage has traditionally consisted of monolithic systems with customized hardware, multiple redundant components and paths, and no single point of failure. Di...
K. K. Rao, James Lee Hafner, Richard A. Golding
TDSC
2011
13 years 6 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...