Sciweavers

384 search results - page 42 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
AIPRF
2008
15 years 3 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
AVI
2006
15 years 3 months ago
Programming rich interactions using the hierarchical state machine toolkit
Structured graphics models such as Scalable Vector Graphics (SVG) enable designers to create visually rich graphics for user interfaces. Unfortunately current programming tools ma...
Renaud Blanch, Michel Beaudouin-Lafon
VMV
2000
157views Visualization» more  VMV 2000»
15 years 3 months ago
Visualization of Principal Curvature Directions by Anisotropic Diffusion
Anisotropic diffusion is known to be a powerful tool in image processing. It enables the smoothing of initially noisy images while still retaining, respectively sharpening edges a...
Udo Diewald, Martin Rumpf
MM
2006
ACM
130views Multimedia» more  MM 2006»
15 years 8 months ago
An unsupervised method for clustering images based on their salient regions of interest
We have developed a biologically-motivated, unsupervised way of grouping together images whose salient regions of interest (ROIs) are perceptually similar regardless of the visual...
Gustavo B. Borba, Humberto R. Gamba, Oge Marques, ...
BIOSIG
2010
143views Biometrics» more  BIOSIG 2010»
14 years 12 months ago
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets
: In this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of...
Jan Hirzel, Daniel Hartung, Christoph Busch