Sciweavers

1262 search results - page 146 / 253
» Fast Robust Hashing
Sort
View
CVPR
2010
IEEE
1778views Computer Vision» more  CVPR 2010»
15 years 11 months ago
Detecting Text in Natural Scenes with Stroke Width Transform
We present a novel image operator that seeks to find the value of stroke width for each image pixel, and demonstrate its use on the task of text detection in natural images. The s...
Boris Epshtein, Eyal Ofek, Yonatan Wexler
129
Voted
CVPR
2009
IEEE
16 years 8 months ago
Real-Time Learning of Accurate Patch Rectification
Recent work [5, 6] showed that learning-based patch rectification methods are both faster and more reliable than affine region methods. Unfortunately, their performance improveme...
Stefan Hinterstoisser, Oliver Kutter, Nassir Navab...
111
Voted
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 9 months ago
Cross-layer Design and Analysis of Wireless Profiled TCP for Vertical Handover
Abstract - In this paper, we consider downward and upward vertical handovers in integrated wireless LAN and cellular networks, and address Wireless Profiled TCP premature timeouts ...
Humphrey Rutagemwa, Sangheon Pack, Xuemin Shen, Jo...
ICMCS
2005
IEEE
139views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Rapid Feature Space Speaker Adaptation for Multi-Stream HMM-Based Audio-Visual Speech Recognition
Multi-stream hidden Markov models (HMMs) have recently been very successful in audio-visual speech recognition, where the audio and visual streams are fused at the final decision...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
15 years 1 months ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...