Search For:

Displaying 1-50 out of 17,075 total
A study of radio frequency interference in the space-to-Earth exploration allocation at L-band
Found in: IEEE Aerospace Conference
By J. Eric Belz, Bryan L. Huneycutt, Michael W. Spencer
Issue Date:March 2011
pp. 1-10
We report on ongoing studies of the anthropogenic radio frequency interference (RFI) in the L-band allocation for space-to-Earth exploration.<sup>1,2</sup> The studies are being conducted for the radar instrument on the proposed Soil Moisture A...
 
Self-Stabilizing k-out-of-l exclusion on tree networks
Found in: Parallel and Distributed Processing Symposium, International
By Ajoy K. Datta,Stephane Devismes,Florian Horn,Lawrence L. Larmore
Issue Date:May 2009
pp. 1-8
In this paper, we address the problem of k-out-of-ℓ exclusion, a generalization of the mutual exclusion problem, in which there are ℓ units of a shared resource, and any process can request up to k units (1 ≤ k ≤ ℓ). We propose the first deterministic self...
 
Blue Gene/L Log Analysis and Time to Interrupt Estimation
Found in: Availability, Reliability and Security, International Conference on
By Narate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, Christian Engelmann
Issue Date:March 2009
pp. 173-180
System- and application-level failures could be characterized by analyzing relevant log files. The resulting data might then be used in numerous studies on and future developments for the mission-critical and large scale computational architecture, includi...
 
The David L. Bassett stereoscopic atlas of human anatomy: developing a specialized collection within the stanford mediaserver digital library
Found in: Proceedings of the 2007 conference on Digital libraries (JCDL '07)
By Amy L. Ladd, Jeremy C. Durack, Margaret Krebs, Parvati Dev, Robert A. Chase, Shyh-Yuan Kung
Issue Date:June 2007
pp. 506-506
We describe the creation of a specialized media collection in the Stanford MediaServer highlighting the David L. Bassett Stereoscopic Atlas of Human Anatomy. Previous reports have outlined the underlying architecture and features of the MediaServer develop...
     
L-SIM : Simulating BPMN Diagrams with a Purpose Built Engine
Found in: Winter Simulation Conference
By A. Waller, M. Clark, L. Enstone
Issue Date:December 2006
pp. 591-597
This paper describes the experiences and technical challenges encountered by the Lanner group in building a Java based simulation engine to simulate BPMN diagrams. It highlights the difference between conventional discrete simulation tools and the requirem...
 
An Efficient Algorithm for the Extended (l, d)-Motif Problem with Unknown Number of Binding Sites
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Henry C. M. Leung, Francis Y. L. Chin
Issue Date:October 2005
pp. 11-18
<p>Finding common patterns, or motifs, from a set of DNA sequences is an important problem in molecular biology. Most motif-discovering algorithms/software require the length of the motif as input. Motivated by the fact that the motif?s length is usu...
 
Knowledge-Driven Extraction of the Four Modified Talairach Cortical Landmarks (A, P, L, and R) from MR Neuroimages
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Qingmao Hu, Wieslaw L. Nowinski
Issue Date:May 2004
pp. 93
An algorithm to locate the four modified Talairach cortical landmarks (A, P, L, and R) based on knowledge is proposed. Knowledge is employed to select the axial plane (the AP plane) passing through the anterior and posterior commissures, determination of o...
 
The BlueGene/L pseudo cycle-accurate simulator
Found in: Performance Analysis of Systems and Software, IEEE International Symmposium on
By L.R. Bachega, J.R. Brunheroto, L. DeRose, P. Mindlin, J.E. Moreira
Issue Date:March 2004
pp. 36-44
The design and development of a new computer system is a lengthy process, with a considerable amount of time elapsed between the beginning of development and first hardware availability. Hence, fast and reasonably accurate simulation of processor architect...
 
System Management in the BlueGene/L Supercomputer
Found in: Parallel and Distributed Processing Symposium, International
By G. Almasi, L. Bachega, R. Bellofatto, J. Brunheroto, C. Caşcaval, J. Castaños, P. Crumley, C. Erway, J. Gagliano, D. Lieber, P. Mindlin, J.E. Moreira, R.K. Sahoo, A. Sanomiya, E. Schenfeld, R. Swetz, M. Bae, G. Laib, K. Ranganathan, Y. Aridor
Issue Date:April 2003
pp. 267b
With 65,536 compute nodes, the BlueGene/L supercomputer represents a new level of scalability for parallel systems. In this paper, we discuss system management and control for BlueGene/L, including machine booting, software installation, user account manag...
 
An Overview of the BlueGene/L Supercomputer
Found in: SC Conference
By N.R. Adiga, G. Almasi, G.S. Almasi, Y. Aridor, R. Barik, D. Beece, R. Bellofatto, G. Bhanot, R. Bickford, M. Blumrich, A.A. Bright, J. Brunheroto, C. Caşcaval, J. Castaños, W. Chan, L. Ceze, P. Coteus, S. Chatterjee, D. Chen, G. Chiu, T.M. Ci
Issue Date:November 2002
pp. 60
This paper gives an overview of the BlueGene/L Supercomputer. This is a jointly funded research partnership between IBM and the Lawrence Livermore National Laboratory as part of the United States Department of Energy ASCI Advanced Architecture Research Pro...
 
Interactive arrangement of botanical L-system models
Found in: Proceedings of the 1999 symposium on Interactive 3D graphics (SI3D '99)
By A. J. Bernheim Brush, David H. Salesin, Joanna L. Power, Przemyslaw Prusinkiewicz
Issue Date:April 1999
pp. 175-182
we present an exact and interactive collision detection system, I-COLLIDE, for large-scale environments. Such environments are characterized by the number of objects undergoing rigid motion and the complexity of the models. The algorithm does not assume th...
     
L/sup 2/ versus L/sup /spl infin// criterion in biomedical image compression (mammograms)
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By L. Karray, C. Monrocq, T.-P. Baum, P. Duhamel
Issue Date:May 1996
pp. 1898-1901
Image compression using L/sup /spl infin//-norm and confidence interval criteria was shown to have some advantages with respect to flexibility and accuracy. The improvements are due to a local control of the distortion, which allows some local knowledge on...
 
Voice and data performance measurements in L-express net
Found in: Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols (SIGCOMM '86)
By E Cadorin, F Borgonovo, L Fratta, M Pezze
Issue Date:August 1986
pp. 120-125
L-Express is a protocol for Local Area Networks based on a single bus topology. It utilizes a simple and efficient virtual token access scheme which provides ordered and collision-free transmission.This paper presents results of measurements performed to i...
     
ALGORITHM 635: an algorithm for the solution of systems of complex linear equations in the L∞ norm with constraints on the unknowns
Found in: ACM Transactions on Mathematical Software (TOMS)
By Roy L. Streit
Issue Date:September 1985
pp. 242-249
An algorithm for computing the quotient of two complex numbers is modified to make it more robust in the presence of underflows.
     
A Test Problem Generator for Discrete Linear L 1 Approximation Problems
Found in: ACM Transactions on Mathematical Software (TOMS)
By D. R. Shier, K. L. Hoffman
Issue Date:December 1980
pp. 587-593
Popular codes for the numerical solution of nonstiff ordinary differential equations (ODEs) are based on a (fixed order) Runge-Kutta method, a variable order Adams method, or an extrapolation method. Extrapolation can be viewed as a variable order Runge-Ku...
     
Processing Satellite Weather Data- a Status Report- Part l
Found in: Managing Requirements Knowledge, International Workshop on
By Charles L. Bristor
Issue Date:December 1962
pp. 1
No summary available.
   
The i-Cube: design considerations for block-based digital manipulatives and their applications
Found in: Proceedings of the Designing Interactive Systems Conference (DIS '12)
By Jacquelyn Tan, L. L. Chamara Fitriani, L. L. Chamara Kasun, Wei Shou, Wooi Boon Goh
Issue Date:June 2012
pp. 398-407
Manipulatives are tangible objects designed to support learning through exploratory arrangement and manipulation. The i-Cube is a cube-shaped digital manipulative that provides unique 3-D spatial awareness of the facets and orientation of neighboring i-Cub...
     
IT Project Variables in the Balance: A Bayesian Approach to Prediction of Support Costs
Found in: Software Engineering, Brazilian Symposium on
By Bruno L. Dalmazo,Abraham L. R. de Sousa,Weverton L. Cordeiro,Juliano A. Wickboldt,Roben C. Lunardi,Ricardo L. dos Santos,Luciano P. Gaspary,Lisandro Z. Granville,Claudio Bartolini,Marianne Hickey
Issue Date:September 2011
pp. 224-232
In the context of Information Technology (IT) project management, it is commonly accepted that the costs associated with support actions are strongly influenced by the effort spent during their development and test phases. Despite the importance of systema...
 
Efficient yarn-based cloth with adaptive contact linearization
Found in: ACM Transactions on Graphics (TOG)
By Doug L. James, Jonathan M. Kaldor, Steve Marschner, Doug L. James, Jonathan M. Kaldor, Steve Marschner, Doug L. James, Jonathan M. Kaldor, Steve Marschner, Doug L. James, Jonathan M. Kaldor, Steve Marschner
Issue Date:July 2010
pp. 1-10
Yarn-based cloth simulation can improve visual quality but at high computational costs due to the reliance on numerous persistent yarn-yarn contacts to generate material behavior. Finding so many contacts in densely interlinked geometry is a pathological c...
     
Rigid-body fracture sound with precomputed soundbanks
Found in: ACM Transactions on Graphics (TOG)
By Changxi Zheng, Doug L. James, Changxi Zheng, Doug L. James, Changxi Zheng, Doug L. James, Changxi Zheng, Doug L. James
Issue Date:July 2010
pp. 1-10
We propose a physically based algorithm for synthesizing sounds synchronized with brittle fracture animations. Motivated by laboratory experiments, we approximate brittle fracture sounds using time-varying rigid-body sound models. We extend methods for fra...
     
Spatial relationship preserving character motion adaptation
Found in: ACM Transactions on Graphics (TOG)
By Chiew-Lan Tai, Edmond S. L. Ho, Taku Komura, Chiew-Lan Tai, Edmond S. L. Ho, Taku Komura, Chiew-Lan Tai, Edmond S. L. Ho, Taku Komura, Chiew-Lan Tai, Edmond S. L. Ho, Taku Komura
Issue Date:July 2010
pp. 1-10
This paper presents a new method for editing and retargeting motions that involve close interactions between body parts of single or multiple articulated characters, such as dancing, wrestling, and sword fighting, or between characters and a restricted env...
     
Cyclic plain-weaving on polygonal mesh surfaces with graph rotation systems
Found in: ACM Transactions on Graphics (TOG)
By Ergun Akleman, Jianer Chen, Jonathan L. Gross, Qing Xing, Ergun Akleman, Jianer Chen, Jonathan L. Gross, Qing Xing, Ergun Akleman, Jianer Chen, Jonathan L. Gross, Qing Xing, Ergun Akleman, Jianer Chen, Jonathan L. Gross, Qing Xing
Issue Date:July 2009
pp. 1-2
In this paper, we show how to create plain-weaving over an arbitrary surface. To create a plain-weaving on a surface, we need to create cycles that cross other cycles (or themselves) by alternatingly going over and under. We use the fact that it is possibl...
     
Harmonic fluids
Found in: ACM Transactions on Graphics (TOG)
By Changxi Zheng, Doug L. James, Changxi Zheng, Doug L. James, Changxi Zheng, Doug L. James, Changxi Zheng, Doug L. James
Issue Date:July 2009
pp. 1-2
Fluid sounds, such as splashing and pouring, are ubiquitous and familiar but we lack physically based algorithms to synthesize them in computer animation or interactive virtual environments. We propose a practical method for automatic procedural synthesis ...
     
Ubiquity interviews USC's Dr. Alice Parker
Found in: Ubiquity
By Alice Parker, Jose L. Ubiquity staff, Jose L. Ubiquity staff, Jose L. Ubiquity staff, Jose L. Ubiquity staff
Issue Date:October 2006
pp. 1-1
With the advent of microarray technology it has been possible to measure thousands of expression values of genes in a single experiment. Biclustering or simultaneous clustering of both genes and conditions is challenging particularly for the analysis of hi...
     
A problem based learning approach for freshman engineering
Found in: Frontiers in Education, Annual
By J.J. Kellar, W. Hovey, M. Langerman, S. Howard, L. Simonson, L. Kjerengtroen, L. Sttler, H. Heilhecker, L. Ameson-Meyer, S.D. Kellogg
Issue Date:October 2000
pp. F2G/7-F2G10
The South Dakota School of Mines and Technology began a revision of the freshman engineering curriculum in 1997. Beginning with a pilot program of 25 students, the program is now required for virtually all first-year engineering students. The program, FC 2...
 
Foreword
Found in: 23rd Annual Symposium on Foundations of Computer Science
By Michael J. Fischer,Michael J. Fischer,Michael J. Fischer,Michael J. Fischer,Seymour Ginsburg,Seymour Ginsburg,Seymour Ginsburg,Seymour Ginsburg,David G. Kirkpatrick,David G. Kirkpatrick,David G. Kirkpatrick,David G. Kirkpatrick,Richard E. Ladner,Richard E. Ladner,Richard E. Ladner,Richard E. Ladner,Gary L. Miller,Gary L. Miller,Gary L. Miller,Gary L. Miller,Nicholas Pippenger,Nicholas Pippenger,Nicholas Pippenger,Nicholas Pippenger,Dana Scott,Dana Scott,Dana Scott,Dana Scott,Leslie G. Valiant,Leslie G. Valiant,Leslie G. Valiant,Leslie G. Valiant,Mihalis Yannakakis,Mihalis Yannakakis,Mihalis Yannakakis,Mihalis Yannakakis,F. Frances Yao,F. Frances Yao,F. Frances Yao,F. Frances Yao
Issue Date:November 1982
pp. iii
No summary available.
   
A theorem-proving language for experimentation
Found in: Communications of the ACM
By L. Henschen, L. Wos, L. Wos, L. Wos, Ross Overbeck, Ross Overbeck, Ross Overbeck
Issue Date:June 1974
pp. 308-314
Because of the large number of strategies and inference rules presently under consideration in automated theorem proving, there is a need for developing a language especially oriented toward automated theorem proving. This paper discusses some of the featu...
     
Using XDMoD to facilitate XSEDE operations, planning and analysis
Found in: Proceedings of the Conference on Extreme Science and Engineering Discovery Environment: Gateway to Discovery (XSEDE '13)
By Abani K. Patra, Amin Ghadersohi, Barry L. Schneider, Charng-Da Lu, David L. Hart, Fugang Wang, Gregor von Laszewski, Jeffrey T. Palmer, John Towns, Matthew D. Jones, Nikolay Simakov, Robert L. DeLeon, Ryan J. Gentner, Steven M. Gallo, Thomas R. Furlani
Issue Date:July 2013
pp. 1-8
The XDMoD auditing tool provides, for the first time, a comprehensive tool to measure both utilization and performance of high-end cyberinfrastructure (CI), with initial focus on XSEDE. Here, we demonstrate, through several case studies, its utility for pr...
     
Measuring Requirements Testing Experience Report
Found in: Proceedings of the (19th) International Conference on Software Engineering
By T. Hammer,L. Rosenberg,L. Huffman,L. Hyatt
Issue Date:July 2013
pp. 372,373,374,375,376,377,378,379
No summary available.
 
Using Space D* for Crowded Real Robots Environments
Found in: 2012 Brazilian Robotics Symposium and Latin American Robotics Symposium (SBR-LARS)
By Luan Silveira,Renan Q. Maffei,Felipe Almeida,Matheus Longaray,Silvia S. C. Botelho,Paulo J. L. Drews Jr.,Alessandro de L. Bicho,Nelson L. Duarte Filho
Issue Date:October 2012
pp. 273-278
This paper describes a new method of path planning for multiple robots in unknown environments and its validation in real robots context. The method, called Space D*, is based on two algorithms: the D*, which is an incremental graph search algorithm, and t...
 
Predictive complex event processing: a conceptual framework for combining complex event processing and predictive analytics
Found in: Proceedings of the Fifth Balkan Conference in Informatics (BCI '12)
By Árpád Beszédes, Gabriella Tóth, Hunor Demeter, László Vidács, Lóránt Farkas, Lajos Jenő Fülöp
Issue Date:September 2012
pp. 26-31
Complex Event Processing deals with the detection of complex events based on rules and patterns defined by domain experts. Many complex events require real-time detection in order to have enough time for appropriate reactions. However, there are several ev...
     
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
Found in: 2012 IEEE Symposium on Security and Privacy
By P. G. Kelley,S. Komanduri,M. L. Mazurek,R. Shay,T. Vidas,L. Bauer,N. Christin,L. F. Cranor,J. Lopez
Issue Date:May 2012
pp. 523-537
Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers' capabilities to perform password cracking. In response to this threat, password composition policies have grown increasingly c...
   
Eco-Feedback on the Go: Motivating Energy Awareness
Found in: Computer
By A Spagnolli,N Corradi,L Gamberini,E Hoggan,G Jacucci,C Katzeff,L Broms,L Jonsson
Issue Date:May 2011
pp. 38-45
The EnergyLife mobile interface incorporates lessons from environmental psychology and feedback intervention to relay information from appliance sensors, offering a gaming environment that rewards users for decreased electricity consumption.
 
Using archetypes and Domain Specific Languages on development of ubiquitous applications to pervasive healthcare
Found in: Computer-Based Medical Systems, IEEE Symposium on
By A. L. Menezes,C. E. Cirilo,J. L. C. de Moraes,W. L. de Souza,Antonio F. do Prado
Issue Date:October 2010
pp. 395-400
Pervasive healthcare focuses on the use of new technologies, tools, and services, in order to help patients to play a more active role in the treatment of their diseases. Since pervasive healthcare environments demand a huge amount of information exchange,...
 
Special session -- Moving from CCLI to TUES -- Meeting NSF expectations
Found in: Frontiers in Education, Annual
By Ning Fang,A McKenna,D L Millard,L C Perez,R L Pimmely
Issue Date:October 2010
pp. S3B-1-S3B-2
Engineering faculty members interested in education research and development projects need NSF funding to support their efforts. This session aims to enable the participants to prepare more competitive curriculum development proposals to the NSF Transformi...
 
An Architecture Proposal for Nested Software Product Lines in the Domain of Mobile and Context-Aware Applications
Found in: Software Components, Architectures and Reuse, Brazilian Symposium on
By Fabiana G. Marinho, Aline L. Costa, Francisco F. P. Lima, João B. B. Neto, João B. F. Filho, Lincoln Rocha, Valéria L. L. Dantas, Rossana M. C. Andrade, Eldanâe Teixeira, Cláudia Werner
Issue Date:September 2010
pp. 51-60
The domain of mobile and context-aware applications involves challenging requirements, such as mobility and adaptation, which makes the application development complex for this area. Considering this scenario, we used a nested software product line (SPL) t...
 
Design of a single layer programmable Structured ASIC library
Found in: Design and Diagnostics of Electronic Circuits and Systems
By Thomas C. P. Chau, David W. L. Wu, Yan-Qing Ai, Brian P. W. Chan, Sam M. H. Ho, Oscar K. L. Lau, Steve C. L. Yuen, Kong-Pang Pun, Oliver C. S. Choy, Philip H. W. Leong
Issue Date:April 2010
pp. 32-35
A Structured Application-specific Integrated Circuit (SASIC) is a programmable fabric in which a small set of masks are customized for a particular application, serving to reduce the associated non-recurring engineering cost (NRE). In this paper we describ...
 
The nested chinese restaurant process and bayesian nonparametric inference of topic hierarchies
Found in: Journal of the ACM (JACM)
By David M. Blei, Michael I. Jordan, Michael I. Jordan, Michael I. Jordan, Thomas L. Griffiths, Thomas L. Griffiths, Thomas L. Griffiths
Issue Date:January 2010
pp. 1-30
We present the nested Chinese restaurant process (nCRP), a stochastic process that assigns probability distributions to ensembles of infinitely deep, infinitely branching trees. We show how this stochastic process can be used as a prior distribution in a B...
     
Why web sites are lost (and how they're sometimes found)
Found in: Communications of the ACM
By Catherine C. Marshall, Frank McCown, Frank McCown, Frank McCown, Michael L. Nelson, Michael L. Nelson, Michael L. Nelson
Issue Date:November 2009
pp. 141-145
Introduction The web is in constant flux---new pages and Web sites appear daily, and old pages and sites disappear almost as quickly. One study estimates that about two percent of the Web disappears from its current location every week.2 Although Web users...
     
And what can context do for data?
Found in: Communications of the ACM
By C. A. Curino, C. Bolchini, C. Bolchini, C. Bolchini, E. Quintarelli, E. Quintarelli, E. Quintarelli, F. A. Schreiber, F. A. Schreiber, F. A. Schreiber, G. Orsi, G. Orsi, G. Orsi, L. Tanca, L. Tanca, L. Tanca, R. Rossato, R. Rossato, R. Rossato
Issue Date:November 2009
pp. 136-140
Introduction Outsourcing as a means of meeting organizational information technology (IT) needs is a commonly accepted and growing practice; one that is continually evolving to include a much wider set of business functions: logistics, accounting, human re...
     
Machine Learning Techniques for the Automated Classification of Adhesin-Like Proteins in the Human Protozoan Parasite Trypanosoma cruzi
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Ana M. Gonzalez, Francisco J. Azuaje, Francisco J. Azuaje, Francisco J. Azuaje, Jose F. da Silveira, Jose F. da Silveira, Jose F. da Silveira, Jose L. Ramirez, Jose L. Ramirez, Jose L. Ramirez, Jose R. Dorronsoro, Jose R. Dorronsoro, Jose R. Dorronsoro
Issue Date:October 2009
pp. 695-702
This paper reports on the evaluation of different machine learning techniques for the automated classification of coding gene sequences obtained from several organisms in terms of their functional role as adhesins. Diverse, biologically-meaningful, sequenc...
     
The role of temporal feature extraction and bagging of MLP neural networks for solving the WCCI 2008 Ford Classification Challenge
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Paulo J. L. Adeodato, Adrian L. Arnaud, Germano C. Vasconcelos, Rodrigo C. L. V. Cunha, Tarcisio B. Gurgel, Domingos S. M. P. Monteiro
Issue Date:June 2009
pp. 57-62
This paper presents an approach for solving WCCI 2008's Ford Classification Challenge Problem. The solution is based on the creation of new input variables through temporal feature extraction and on the combination via bagging of an ensemble of 30 multi-la...
 
EXE: Automatically Generating Inputs of Death
Found in: ACM Transactions on Information and System Security (TISSEC)
By Cristian Cadar, David L. Dill, David L. Dill, David L. Dill, Dawson R. Engler, Dawson R. Engler, Dawson R. Engler, Peter M. Pawlowski, Peter M. Pawlowski, Peter M. Pawlowski, Vijay Ganesh, Vijay Ganesh, Vijay Ganesh
Issue Date:December 2008
pp. 1-38
This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input, EXE runs it on symbolic input initially allowed to be anything. As checked...
     
Breaking the memory wall in MonetDB
Found in: Communications of the ACM
By Martin L. Kersten, Peter A. Boncz, Stefan Manegold, Martin L. Kersten, Martin L. Kersten, Peter A. Boncz, Peter A. Boncz, Stefan Manegold, Stefan Manegold
Issue Date:December 2008
pp. 486-487
In the past decades, advances in speed of commodity CPUs have far outpaced advances in RAM latency. Main-memory access has therefore become a performance bottleneck for many computer applications; a phenomenon that is widely known as the "memory wall." In ...
     
Analysis Based on Generalized Vector Quantization for Information Hiding
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chun-e Zhang, Zhengding Qiu, L. L. Cheng, L. M. Cheng
Issue Date:August 2008
pp. 1316-1320
This paper proposes an analysis method based on generalized vector quantization for information hiding. The analysis tries to construct a framework to model the process of information hiding and extraction by the notion of generalized vector quantization. ...
 
A Robust Watermarking Scheme Using Selective Curvelet Coefficients
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By H. Y. Leung, L. M. Cheng, L. L. Cheng
Issue Date:August 2008
pp. 465-468
In this paper, a digital watermarking algorithm used in the curvelet domain is proposed. Wrapping of specially selected Fourier samples is employed to implement Fast Discrete Curvelet Transforms (FDCT) to transform the digital image to the curvelet domain....
 
Software Effort Estimation using Machine Learning Techniques with Robust Confidence Intervals
Found in: Hybrid Intelligent Systems, International Conference on
By Petronio L. Braga, Adriano L. I. Oliveira, Silvio R. L. Meira
Issue Date:September 2007
pp. 352-357
The precision and reliability of the estimation of the effort of software projects is very important for the competitiveness of software companies. Good estimates play a very important role in the management of software projects. Most methods proposed for ...
 
Extended EDCA for providing bounded delay services in 802.11e WLANs
Found in: Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems (MSWiM '06)
By G. Boggia, L. A. Grieco, L. Blasi, L. Carbone, P. Camarda
Issue Date:October 2006
pp. 273-276
IEEE 802.11e Working Group has recently proposed an Enhanced Distributed Coordination Access (EDCA) scheme to improve the standard 802.11 Distributed Coordination Function (DCF) in order to provide service differentiation capabilities to WLANs. However, it...
     
A modern approach to the automatic design and testing of domestic appliances
Found in: Mediterranean Conference on Control and Automation
By S. Frattesi, L. Andrenacci, L. Pasqualini, L. Starna
Issue Date:June 2006
pp. 1-5
Household appliances are becoming smarter and smarter. Their easiness of use and performances are improving dramatically, mainly thanks to a massive introduction of electronic control systems. This tendency is even more evident in white goods, where nowada...
 
An ultra-low energy asynchronous processor for Wireless Sensor Networks
Found in: Asynchronous Circuits and Systems, International Symposium on
By L. Necchi, L. Lavagno, D. Pandini, L. Vanzago
Issue Date:March 2006
pp. 78-85
This paper describes the design flow used for an asynchronous 8-bit processor implementing the Atmel AVR instruction set architecture. The goal is to show dramatic reductions in power and energy with respect to the synchronous case, while retaining essenti...
 
 1  2 Next >>