Sciweavers

708 search results - page 65 / 142
» Computational Law
Sort
View
ACCV
2006
Springer
15 years 5 months ago
Minimal Weighted Local Variance as Edge Detector for Active Contour Models
Performing segmentation of narrow, elongated structures with low contrast boundaries is a challenging problem. Boundaries of these structures are difficult to be located when noise...
Max W. K. Law, Albert C. S. Chung
ISVLSI
2003
IEEE
138views VLSI» more  ISVLSI 2003»
15 years 5 months ago
Bouncing Threads: Merging a New Execution Model into a Nanotechnology Memory
The need for small, high speed, low power computers as the end of Moore’s law approaches is driving research into nanotechnology. These novel devices have significantly differe...
Sarah E. Frost, Arun Rodrigues, Charles A. Giefer,...
ICPR
2006
IEEE
16 years 1 months ago
Local Behaviours Labelling for Content Based Video Copy Detection
This paper presents an approach for indexing a large set of videos by considering the dynamic behaviour of local visual features along the sequences. The proposed concept is based...
Julien Law-To, Valérie Gouet-Brunet, Olivie...
COLING
2010
14 years 6 months ago
A Linguistically Grounded Graph Model for Bilingual Lexicon Extraction
We present a new method, based on graph theory, for bilingual lexicon extraction without relying on resources with limited availability like parallel corpora. The graphs we use re...
Florian Laws, Lukas Michelbacher, Beate Dorow, Chr...
77
Voted
PAM
2012
Springer
13 years 7 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...