Sciweavers

3941 search results - page 426 / 789
» Computational Efficiency of Batching Methods
Sort
View
JCP
2008
162views more  JCP 2008»
15 years 24 days ago
Shape Recognition by Clustering and Matching of Skeletons
We perform the task of shape recognition using a skeleton based method. Skeleton of the shape is considered as a free tree and is represented by a connectivity graph. Geometric fea...
Hamidreza Zaboli, Mohammad Rahmati, Abdolreza Mirz...
COLING
2002
15 years 19 days ago
Unknown Word Extraction for Chinese Documents
There is no blank to mark word boundaries in Chinese text. As a result, identifying words is difficult, because of segmentation ambiguities and occurrences of unknown words. Conve...
Keh-Jiann Chen, Wei-Yun Ma
112
Voted
ICIP
2006
IEEE
16 years 2 months ago
Two-Stage Optimal Component Analysis
Linear techniques are widely used to reduce the dimension of image representation spaces in applications such as image indexing and object recognition. Optimal Component Analysis ...
Yiming Wu, Xiuwen Liu, Washington Mio, Kyle A. Gal...
MICCAI
2003
Springer
16 years 1 months ago
Medially Based Meshing with Finite Element Analysis of Prostate Deformation
The finite element method (FEM) is well suited for use in the non-rigid registration of magnetic resonance spectroscopy images (MRSI) with intraoperative ultrasound images of the p...
Jessica R. Crouch, Stephen M. Pizer, Edward L. Cha...
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 6 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...