Sciweavers

3424 search results - page 423 / 685
» Building Diverse Computer Systems
Sort
View
ICPR
2010
IEEE
15 years 8 months ago
A Robust Iris Localization Method Using an Active Contour Model and Hough Transform
Iris segmentation is one of the crucial steps in building an iris recognition system since it affects the accuracy of the iris matching significantly. This segmentation should acc...
Jaehan Koh, Venu Govindaraju, Vipin Chaudhary
ICPR
2010
IEEE
15 years 8 months ago
Lattice-Based Anomaly Rectification for Sport Video Annotation
Anomaly detection has received much attention within the literature as a means of determining, in an unsupervised manner, whether a learning domain has changed in a fundamental way...
Aftab Khan, David Windridge, Teofilo De Campos
ICDCS
1997
IEEE
15 years 8 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh
DCC
1996
IEEE
15 years 8 months ago
Pattern-based Compression of Text Images
We suggest a novel approach for compressing images of text documents based on building up a simple derived font from patterns in the image, and present the results of a prototype ...
Andrei Z. Broder, Michael Mitzenmacher
SPDP
1993
IEEE
15 years 8 months ago
The Meerkat Multicomputer
Meerkat is a distributed memory multicomputer architecture that scales to hundreds of processors. Meerkat uses a two dimensional passive backplane to connect nodes composed of pro...
Robert C. Bedichek, Curtis Brown