380,800 Result(s)

within Chapter

Lecture Notes in Computer Science

You are now only searching within the Book Series

Lecture Notes in Computer Science

Relevance Newest First Oldest First
previous Page of 19,040
  1. No Access

    Chapter and Conference Paper

    DeepStyleCam: A Real-Time Style Transfer App on iOS

    In this demo, we present a very fast CNN-based style transfer system running on normal iPhones. The proposed app can transfer multiple pre-trained styles to the video stream captured from the built-in camera o...

    Ryosuke Tanno, Shin Matsuo, Wataru Shimoda, Keiji Yanai in MultiMedia Modeling (2017)

  2. No Access

    Chapter and Conference Paper

    Building an Online Adaptive Learning and Recommendation Platform

    In the traditional e-learning environment lack of immediate learning assistance. This online adaptive learning and recommendation platform (ALR) provide tracking tool for instructors to “observe” or “monitor”...

    Hsiao-Chien Tseng, Chieh-Feng Chiang, Jun-Ming Su in Emerging Technologies for Education (2017)

  3. No Access

    Chapter and Conference Paper

    Enhanced Retrieval and Browsing in the IMOTION System

    This paper presents the IMOTION system in its third version. While still focusing on sketch-based retrieval, we improved upon the semantic retrieval capabilities introduced in the previous version by adding mo...

    Luca Rossetto, Ivan Giangreco, Claudiu Tănase, Heiko Schuldt in MultiMedia Modeling (2017)

  4. No Access

    Chapter and Conference Paper

    Specifying Software Requirements for Safety-Critical Railway Systems: An Experience Report

    Context and motivation: Software safety requirements are fundamental in the definition of risk reduction measures for safety critical systems, since they are developed to satisfy the system safety constr...

    Luciana Provenzano, Kaj Hänninen in Requirements Engineering: Foundation for S… (2017)

  5. No Access

    Chapter and Conference Paper

    Collision of Solitons for a Non-homogenous Version of the KdV Equation: Asymptotics and Numerical Simulation

    We consider a generalized KdV equation with a small dispersion and \(C^1\) -nonlinearity ...

    G. Omel’yanov in Numerical Analysis and Its Applications (2017)

  6. No Access

    Chapter and Conference Paper

    Assessment and Optimization of Air Monitoring Network for Smart Cities with Multicriteria Decision Analysis

    Environmental monitoring networks need to be designed in efficient way, to minimize costs and maximize the information granted by their operation. Gathering data from monitoring stations is also the essence of...

    Aleksander Orłowski, Mariusz Marć in Intelligent Information and Database Syste… (2017)

  7. No Access

    Chapter and Conference Paper

    Model-Driven Development in Practice: From Requirements to Code

    A crucial success factor in information systems development is the alignment of the final software product with business goals, business semantics and business processes. Developers should be freed from progra...

    Oscar Pastor in SOFSEM 2017: Theory and Practice of Computer Science (2017)

  8. No Access

    Chapter and Conference Paper

    Pairwise and Incremental Multi-stage Alignment of Metagenomes: A New Proposal

    Traditional comparisons between metagenomes are often performed using reference databases as intermediary templates from which to obtain distance metrics. However, in order to fully exploit the potential of th...

    Esteban Pérez-Wohlfeil, Oscar Torreno in Bioinformatics and Biomedical Engineering (2017)

  9. No Access

    Chapter and Conference Paper

    Requirements Quality Assurance in Industry: Why, What and How?

    Context and Motivation: Natural language is the most common form to specify requirements in industry. The quality of the specification depends on the capability of the writer to formulate requirements ai...

    Michael Unterkalmsteiner, Tony Gorschek in Requirements Engineering: Foundation for S… (2017)

  10. No Access

    Chapter and Conference Paper

    A Comparative Study of Classifier Performance on Spatial and Temporal Features of Handwritten Behavioural Data

    The issue of comparing classification algorithms on a data set to find optimal classifier has always been a demanding issue in Machine Learning studies. The goal of this work was to compare the performance of ...

    Asok Bandyopadhyay, Abhisek Hazra in Intelligent Human Computer Interaction (2017)

  11. No Access

    Chapter and Conference Paper

    AProVE: Proving and Disproving Termination of Memory-Manipulating C Programs

    AProVE is a system for automatic termination and complexity analysis of C, Java, Haskell, Prolog, and several forms of rewrite systems. The new contributions in this version of AProVE are its capabilitie...

    Jera Hensel, Frank Emrich, Florian Frohn in Tools and Algorithms for the Construction … (2017)

  12. No Access

    Chapter and Conference Paper

    A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography

    It is easy to determine if a given code \(\mathcal {C}\) is a subcode of another known code ...

    Thierry P. Berger, Cheikh Thiécoumba Gueye in Codes, Cryptology and Information Security (2017)

  13. No Access

    Chapter and Conference Paper

    VLIW-Based FPGA Computation Fabric with Streaming Memory Hierarchy for Medical Imaging Applications

    In this paper, we present and evaluate an FPGA acceleration fabric that uses VLIW softcores as processing elements, combined with a memory hierarchy that is designed to stream data between intermediate stages ...

    Joost Hoozemans, Rolf Heij, Jeroen van Straten in Applied Reconfigurable Computing (2017)

  14. No Access

    Chapter and Conference Paper

    Toward Rank Disaggregation: An Approach Based on Linear Programming and Latent Variable Analysis

    This work presents an unsupervised approach to the problem of rank disaggregation, which can be defined as the task of decomposing a set of rankings provided by different people (or entities). To accomplish th...

    Vincent Vigneron in Latent Variable Analysis and Signal Separation (2017)

  15. No Access

    Chapter and Conference Paper

    Visualizing Lost Designs in Degraded Early Modern Tapestry Using Infra-red Image

    This paper shows how to experimentally visualize lost designs in damaged early modern tapestries used in the Kyoto Gion festival. Unlike cloth weaving, tapestry is weft-faced weaving. As the surface welt threa...

    Masaru Tsuchida, Keiji Yano, Kaoru Hiramatsu, Kunio Kashino in Computational Color Imaging (2017)

  16. No Access

    Chapter and Conference Paper

    Storyboard-Based Video Browsing Using Color and Concept Indices

    We present an interface for interactive video browsing where users visually skim storyboard representations of the files in search for known items (known-item search tasks) and textually described subjects, ob...

    Wolfgang Hürst, Algernon Ip Vai Ching, Klaus Schoeffmann in MultiMedia Modeling (2017)

  17. No Access

    Chapter and Conference Paper

    Algorithm of Competing Processes for the Richardson Iteration Method with the Chebyshev Parameters

    A method for solving linear systems of equations with sign-definite self-adjoint operator matrix by the Richardson iteration method in case of the absence of information about the lower spectral bound of a pro...

    Mikhail V. Popov, Yuriy A. Poveschenko in Numerical Analysis and Its Applications (2017)

  18. No Access

    Chapter and Conference Paper

    New Algorithmic Results for Bin Packing and Scheduling

    In this paper we present an overview about new results for bin packing and related scheduling problems. During the last years we have worked on the design of efficient exact and approximation algorithms for pa...

    Klaus Jansen in Algorithms and Complexity (2017)

  19. No Access

    Chapter and Conference Paper

    Real Time Localization Using Bluetooth Low Energy

    In recent years the research on real time indoor and outdoor localization is becoming very intensive, due to the possibility offered by new RF technologies and to the wide range of possible applications. Many ...

    Massimo Conti in Bioinformatics and Biomedical Engineering (2017)

  20. No Access

    Chapter and Conference Paper

    A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack

    Fuzzy logic is one of the powerful tools for reasoning under uncertainty and since uncertainty is an intrinsic characteristic of intrusion analysis, Fuzzy logic is therefore an appropriate tool to use to analy...

    Nenekazi Nokuthala Penelope Mkuzangwe in Intelligent Information and Database Syste… (2017)

previous Page of 19,040