Sciweavers

2490 search results - page 150 / 498
» A General Method for Feature Matching and Model Extraction
Sort
View
130
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Embedded Fingerprint Verification System
Fingerprint verification is one of the most reliable personal identification methods in biometrics. In this paper, an effective fingerprint verification system is presented. We de...
Gwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, S...
127
Voted
WWW
2008
ACM
16 years 4 months ago
Extraction and mining of an academic social network
This paper addresses several key issues in extraction and mining of an academic social network: 1) extraction of a researcher social network from the existing Web; 2) integration ...
Jie Tang, Jing Zhang, Limin Yao, Juan-Zi Li
118
Voted
CN
2007
123views more  CN 2007»
15 years 3 months ago
Generalized multicast congestion control
Efficient multicast congestion control (MCC) is one of the critical components required to enable the IP multicast deployment over the Internet. Previously proposed MCC schemes ca...
Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kal...
145
Voted
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 10 months ago
Video copy detection by fast sequence matching
Sequence matching techniques are effective for comparing two videos. However, existing approaches suffer from demanding computational costs and thus are not scalable for large-sca...
Mei-Chen Yeh, Kwang-Ting Cheng
159
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith