Sciweavers

21319 search results - page 254 / 4264
» An Approach for Method Reengineering
Sort
View
ICASSP
2009
IEEE
15 years 11 months ago
A scale transform based method for rhythmic similarity of music
This paper introduces scale transforms to measure rhythmic similarity between two musical pieces. The rhythm of a piece of music is described by the scale transform magnitude, com...
Andre Holzapfel, Yannis Stylianou
137
Voted
ICASSP
2009
IEEE
15 years 11 months ago
Minimax design of adjustable FIR filters using 2D polynomial methods
The problem under study here is the minimax design of linearphase lowpass FIR filters having variable passband width and implemented through a Farrow structure. We have two main ...
Bogdan Dumitrescu, Bogdan C. Sicleru, Radu Stefan
128
Voted
ICDAR
2009
IEEE
15 years 11 months ago
A Self-Adaptive Method for Extraction of Document-Specific Alphabets
Recognition and encoding of digitized historical documents is still a challenging and difficult task. A major problem is the occurrence of unknown glyphs and symbols which might n...
Stefan Pletschacher
150
Voted
SSDBM
2009
IEEE
149views Database» more  SSDBM 2009»
15 years 11 months ago
Reverse k-Nearest Neighbor Search Based on Aggregate Point Access Methods
Abstract. We propose an original solution for the general reverse k-nearest neighbor (RkNN) search problem in Euclidean spaces. Compared to the limitations of existing methods for ...
Hans-Peter Kriegel, Peer Kröger, Matthias Ren...
172
Voted
MCETECH
2009
Springer
15 years 11 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan