Sciweavers

11462 search results - page 388 / 2293
» Developing Application-Centric Methods
Sort
View
ICIP
2010
IEEE
15 years 2 months ago
An automated vertebra identification and segmentation in CT images
In this paper, we propose a new 3D framework to identify and segment VBs and TBs in clinical computed tomography (CT) images without any user intervention. The Matched filter is e...
Melih S. Aslan, Asem M. Ali, Ham Rara, Aly A. Fara...
133
Voted
ICPR
2010
IEEE
15 years 2 months ago
Improved Mandarin Keyword Spotting Using Confusion Garbage Model
This paper presents an improved acoustic keyword spotting (KWS) algorithm using a novel confusion garbage model in Mandarin conversational speech. Observing the KWS corpus, we foun...
Shilei Zhang, Zhiwei Shuang, Qin Shi, Yong Qin
BIS
2009
112views Business» more  BIS 2009»
15 years 2 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
157
Voted
CDC
2009
IEEE
164views Control Systems» more  CDC 2009»
15 years 2 months ago
Real-time MPC - Stability through robust MPC design
Recent results have suggested that online Model Predictive Control (MPC) can be computed quickly enough to control fast sampled systems. High-speed applications impose a hard real-...
Melanie Nicole Zeilinger, Colin Neil Jones, Davide...
ICASSP
2009
IEEE
15 years 2 months ago
Weighted nonnegative matrix factorization
Nonnegative matrix factorization (NMF) is a widely-used method for low-rank approximation (LRA) of a nonnegative matrix (matrix with only nonnegative entries), where nonnegativity...
Yong-Deok Kim, Seungjin Choi