Sciweavers

4307 search results - page 513 / 862
» Dynamic Spyware Analysis
Sort
View
STOC
2005
ACM
167views Algorithms» more  STOC 2005»
16 years 4 months ago
Approximately counting integral flows and cell-bounded contingency tables
We consider the problem of approximately counting integral flows in a network. We show that there is an fpras based on volume estimation if all capacities are sufficiently large, ...
Mary Cryan, Martin E. Dyer, Dana Randall
CCS
2009
ACM
15 years 11 months ago
Mixed-initiative security agents
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge, and require...
Rachel Greenstadt, Sadia Afroz, Michael Brennan
ICDAR
2009
IEEE
15 years 11 months ago
Arabic Handwriting Recognition Using Restored Stroke Chronology
In this paper we present a system of the off-line handwriting recognition. Our recognition system is based on temporal order restoration of the off-line trajectory. For this task ...
Abdelkarim Elbaati, Houcine Boubaker, Monji Kheral...
ICDAR
2009
IEEE
15 years 11 months ago
Integrating Language Model in Handwritten Chinese Text Recognition
This paper describes a system for handwritten Chinese text recognition integrating language model. On a text line image, the system generates character segmentation and word segme...
Qiu-Feng Wang, Fei Yin, Cheng-Lin Liu
ICDAR
2009
IEEE
15 years 11 months ago
Character-SIFT: A Novel Feature for Offline Handwritten Chinese Character Recognition
SIFT descriptor has been widely applied in computer vision and object recognition, but has not been explored in the field of handwritten Chinese character recognition. In this pap...
Zhiyi Zhang, Lianwen Jin, Kai Ding, Xue Gao