Sciweavers

5948 search results - page 1035 / 1190
» Computing Robust Counter-Strategies
Sort
View
117
Voted
HICSS
2003
IEEE
145views Biometrics» more  HICSS 2003»
15 years 8 months ago
The DISCIPLE System for Collaboration over the Heterogeneous Web
With the proliferation of mobile devices we witness an increasing demand for supporting collaboration among users working in the field and in the office. A key component for colla...
Allan Meng Krebs, Mihail F. Ionescu, Bogdan Doroho...
132
Voted
ICDAR
2003
IEEE
15 years 8 months ago
Segmentation of Bangla Unconstrained Handwritten Text
To take care of variability involved in the writing style of different individuals in this paper we propose a robust scheme to segment unconstrained handwritten Bangla texts into ...
U. Pal, Sagarika Datta
104
Voted
ICDAR
2003
IEEE
15 years 8 months ago
Numeral recognition for quality control of surgical sachets
In this paper we describe an application of OCR techniques to quality control in industrial production. The purpose of the system is to verify the correct printing of numerical in...
Ernest Valveny, Antonio López
ICNP
2003
IEEE
15 years 8 months ago
The Impact of False Sharing on Shared Congestion Management
Several recent proposals for sharing congestion information across concurrent flows between end-systems overlook an important problem: two or more flows sharing congestion state...
Aditya Akella, Srinivasan Seshan, Hari Balakrishna...
129
Voted
ICNP
2003
IEEE
15 years 8 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
« Prev « First page 1035 / 1190 Last » Next »