Sciweavers

3630 search results - page 395 / 726
» Fast Marching Methods
Sort
View
ICDAR
2005
IEEE
15 years 10 months ago
Cursive word skew/slant corrections based on Radon transform
This paper presents two fast and robust algorithms for word skew and slant corrections based on Radon transform. For the skew correction, we maximize a global measure which is deï...
Jian-xiong Dong, Dominique Ponson, Adam Krzyzak, C...
ICIP
2005
IEEE
15 years 10 months ago
Medical image registration based on random line sampling
One of the key aspects in 3D-image registration is the computation of the joint intensity histogram. We propose a new approach to compute this histogram using uniformly distribute...
Anton Bardera, Miquel Feixas, Imma Boada, Mateu Sb...
NDSS
2005
IEEE
15 years 10 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
VTS
2005
IEEE
96views Hardware» more  VTS 2005»
15 years 10 months ago
Implementing a Scheme for External Deterministic Self-Test
A new method for test resource partitioning is introduced which keeps the design-for-test logic independent of the test set and moves the test pattern dependent information to an ...
Abdul Wahid Hakmi, Hans-Joachim Wunderlich, Valent...
143
Voted
DSSCV
2005
Springer
15 years 10 months ago
Exploiting Deep Structure
Abstract. Blurring an image with a Gaussian of width σ and considering σ as an extra dimension, extends the image to an Gaussian scale space (GSS) image. In this GSS-image the is...
Arjan Kuijper