Sciweavers

2386 search results - page 369 / 478
» Database Security 2000
Sort
View
ICPR
2000
IEEE
15 years 2 months ago
Fractal Transforms and Feature Invariance
In this paper, fractal transforms are employed with the aim of image recognition. It is known that such transforms are highly sensitive to distortions like a small shift of an ima...
Ben A. M. Schouten, Paul M. de Zeeuw
ICPR
2000
IEEE
15 years 2 months ago
Statistical-Based Approach to Word Segmentation
Thispaper presents a text word extraction algorithm that takes a set of bounding boxes of glyphs and their associated text lines of a given document andpartitions the glyphs into ...
Yalin Wang, Robert M. Haralick, Ihsin T. Phillips
ICRA
2000
IEEE
118views Robotics» more  ICRA 2000»
15 years 2 months ago
4-D/RCS Reference Model Architecture for Unmanned Ground Vehicles
4-D/RCS is the reference model architecture currently being developed for the Demo III Experimental Unmanned Vehicle program. 4-D/RCS integrates the NIST (National Institute of St...
James S. Albus
IPPS
2000
IEEE
15 years 2 months ago
Support for Recoverable Memory in the Distributed Virtual Communication Machine
The Distributed Virtual Communication Machine (DVCM) is a software communication architecture for clusters of workstations equipped with programmable network interfaces (NIs) for ...
Marcel-Catalin Rosu, Karsten Schwan
SIBGRAPI
2000
IEEE
15 years 2 months ago
Brazilian Bank Check Handwritten Legal Amount Recognition
This paper presents a system that is being developed for the recognition of the handwritten legal amount in Brazilian bank checks. Our strategy used to approach the handwritten leg...
Cinthia Obladen de Almendra Freitas, Abdenaim El Y...