Sciweavers

1717 search results - page 321 / 344
» Error concealment using a diffusion based method
Sort
View
PAMI
2002
143views more  PAMI 2002»
14 years 9 months ago
Lexicon-Driven Segmentation and Recognition of Handwritten Character Strings for Japanese Address Reading
This paper describes a handwritten character string recognition system for Japanese mail address reading on very large vocabulary. The address phrases are recognized as a whole bec...
Cheng-Lin Liu, Masashi Koga, Hiromichi Fujisawa
PRL
2007
180views more  PRL 2007»
14 years 9 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
RAS
2008
127views more  RAS 2008»
14 years 9 months ago
Online generation of cyclic leg trajectories synchronized with sensor measurement
The generation of trajectories for a biped robot is a problem which has been largely studied for several years, and many satisfying off-line solutions exist for steady-state walki...
Rodolphe Héliot, Bernard Espiau
EMNLP
2010
14 years 7 months ago
NLP on Spoken Documents Without ASR
There is considerable interest in interdisciplinary combinations of automatic speech recognition (ASR), machine learning, natural language processing, text classification and info...
Mark Dredze, Aren Jansen, Glen Coppersmith, Ken Wa...
CORR
2010
Springer
179views Education» more  CORR 2010»
14 years 6 months ago
Comparison of Support Vector Machine and Back Propagation Neural Network in Evaluating the Enterprise Financial Distress
Recently, applying the novel data mining techniques for evaluating enterprise financial distress has received much research alternation. Support Vector Machine (SVM) and back prop...
Ming-Chang Lee, To Chang