Sciweavers

1566 search results - page 113 / 314
» Contification Using Dominators
Sort
View
DRR
2011
13 years 9 months ago
How carefully designed open resource sharing can help and expand document analysis research
w—king d—t—sets —v—il—˜le for peer reviewing of pu˜lished do™ument —n—lysis methods or distri˜uting l—rge ™ommonly used do™ument ™orpor— for ˜en™hm—rking —re ...
Bart Lamiroy, Daniel P. Lopresti, Henry F. Korth, ...
ICIP
2002
IEEE
15 years 11 months ago
Segmentation and histogram generation using the HSV color space for image retrieval
We have analyzed the properties of the HSV (Hue, Saturation and Value) color space with emphasis on the visual perception of the variation in Hue, Saturation and Intensity values ...
Shamik Sural, Gang Qian, Sakti Pramanik
PERVASIVE
2009
Springer
15 years 4 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
CIS
2007
Springer
15 years 4 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
GECCO
2004
Springer
244views Optimization» more  GECCO 2004»
15 years 3 months ago
Using Clustering Techniques to Improve the Performance of a Multi-objective Particle Swarm Optimizer
In this paper, we present an extension of the heuristic called “particle swarm optimization” (PSO) that is able to deal with multiobjective optimization problems. Our approach ...
Gregorio Toscano Pulido, Carlos A. Coello Coello