Sciweavers

2089 search results - page 72 / 418
» A New Problem in String Searching
Sort
View
CSE
2009
IEEE
15 years 4 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
ICDAR
2003
IEEE
15 years 3 months ago
A Case Restoration Approach to Named Entity Tagging in Degraded Documents
This paper describes a novel approach to named entity (NE) tagging on degraded documents. NE tagging is the process of identifying salient text strings in unstructured text, corre...
Rohini K. Srihari, Cheng Niu, Wei Li, Jihong Ding
ICASSP
2010
IEEE
14 years 10 months ago
A new method for kurtosis maximization and source separation
This paper introduces a new method to maximize kurtosisbased contrast functions. Such contrast functions appear in the problem of blind source separation of convolutively mixed so...
Marc Castella, Eric Moreau
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
15 years 4 months ago
Transgenetic algorithm: a new evolutionary perspective for heuristics design
Transgenetic algorithms are evolutionary computing techniques based on living processes where cooperation is the main evolutionary strategy. Those processes contain the movement o...
Elizabeth Ferreira Gouvea Goldbarg, Marco Cé...
ICPR
2002
IEEE
15 years 11 months ago
A New Algorithm for Inexact Graph Matching
The graph is an essential data structure for representing relational information. When graphs are used to represent objects, comparing objects amounts to graph matching. Inexact g...
Adel Hlaoui, Shengrui Wang