Sciweavers

5948 search results - page 318 / 1190
» Computing Robust Counter-Strategies
Sort
View
149
Voted
ICDAR
2009
IEEE
15 years 2 months ago
A Novel Two Stage Evaluation Methodology for Word Segmentation Techniques
Word segmentation is a critical stage towards word and character recognition as well as word spotting and mainly concerns two basic aspects, distance computation and gap classific...
Georgios Louloudis, Nikolaos Stamatopoulos, Basili...
113
Voted
ICIP
2005
IEEE
16 years 6 months ago
Extracting micro-structural gabor features for face recognition
Robustness and discriminability are two key issues in face recognition. In this paper, we propose a new algorithm which extracts micro-structural Gabor feature to achieve good robu...
Dian Gong, Qiong Yang, Xiaoou Tang, Jianhua Lu
123
Voted
IEEEARES
2007
IEEE
15 years 11 months ago
On the use of one-way chain based authentication protocols in secure control systems
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
Bogdan Groza, Toma-Leonida Dragomir
155
Voted
AUTOMATICA
2007
110views more  AUTOMATICA 2007»
15 years 4 months ago
Stability analysis of systems with uncertain time-varying delays
Stability in presence of bounded uncertain time-varying delays in the feedback loop of a system is studied. The delay parameter is assumed to be an unknown time-varying function f...
Chung-Yao Kao, Anders Rantzer
154
Voted
ICPR
2006
IEEE
16 years 5 months ago
Monocular Vision Based SLAM for Mobile Robots
This paper describes a new vision based method for the Simultaneous Localization and Mapping of mobile robots. The only data used is a video input from a moving calibrated monocul...
E. Mouragnon, Fabien Dekeyser, Maxime Lhuillier, M...