Sciweavers

SAC
2005
ACM
15 years 2 months ago
Handwritten character skeletonisation for forensic document analysis
A new method of skeletonisation (stroke extraction) of handwritten character images is presented. The method has been designed to extract the skeleton which is very close to human...
Vladimir Pervouchine, Graham Leedham, Konstantin M...
SAC
2005
ACM
15 years 2 months ago
Adaptive and fault tolerant medical vest for life-critical medical monitoring
In recent years, exciting technological advances have been made in development of flexible electronics. These technologies offer the opportunity to weave computation, communicat...
Roozbeh Jafari, Foad Dabiri, Philip Brisk, Majid S...
SAC
2005
ACM
15 years 2 months ago
The role of visualization in effective data cleaning
Using visualization techniques to assist conventional data mining tasks has attracted considerable interest in recent years. This paper addresses a challenging issue in the use of...
Yu Qian, Kang Zhang
SAC
2005
ACM
15 years 2 months ago
An adaptive TDMA slot assignment protocol in ad hoc sensor networks
Due to its ability to provide collision-free packet transmission regardless of the traffic load, TDMA (Time Division Multiple Access) has been applied in ad hoc sensor networks. W...
Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio
SAC
2005
ACM
15 years 2 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
Applied Computing
Top of PageReset Settings