Sciweavers

13336 search results - page 2643 / 2668
» Computer Vision: Algorithms and Applications
Sort
View
ICAPR
2005
Springer
15 years 3 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...
CASES
2004
ACM
15 years 3 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
DOCENG
2004
ACM
15 years 3 months ago
Page composition using PPML as a link-editing script
The advantages of a COG (Component Object Graphic) approach to the composition of PDF pages have been set out in a previous paper [1]. However, if pages are to be composed in this...
Steven R. Bagley, David F. Brailsford
IUI
2004
ACM
15 years 3 months ago
An intelligent 3D user interface adapting to user control behaviors
The WALK mode is one of the most common navigation interfaces for 3D virtual environments. However, due to the limited view angle and low frame rate, users are often blocked by ob...
Tsai-Yen Li, Shu-Wei Hsu
MOBIHOC
2004
ACM
15 years 2 months ago
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and ...
Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura
« Prev « First page 2643 / 2668 Last » Next »