Sciweavers

1518 search results - page 132 / 304
» Cryptographic Test Correction
Sort
View
IJDAR
2002
98views more  IJDAR 2002»
15 years 3 months ago
An unconstrained handwriting recognition system
Abstract. In this paper, an integrated offline recognition system for unconstrained handwriting is presented. The proposed system consists of seven main modules: skew angle estimat...
Ergina Kavallieratou, Nikos Fakotakis, George K. K...
138
Voted
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 3 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Polyphonic Audio Key Finding Using the Spiral Array CEG Algorithm
Key finding is an integral step in content-based music indexing and retrieval. In this paper, we present an O(n) real-time algorithm for determining key from polyphonic audio. We ...
Ching-Hua Chuan, Elaine Chew
129
Voted
DBPL
1999
Springer
109views Database» more  DBPL 1999»
15 years 8 months ago
Expressing Topological Connectivity of Spatial Databases
We consider two-dimensional spatial databases defined in terms of polynomial inequalities and focus on the potential of programming languages for such databases to express queries...
Floris Geerts, Bart Kuijpers
133
Voted
ASPLOS
2010
ACM
15 years 10 months ago
Virtualized and flexible ECC for main memory
We present a general scheme for virtualizing main memory errorcorrection mechanisms, which map redundant information needed to correct errors into the memory namespace itself. We ...
Doe Hyun Yoon, Mattan Erez