Sciweavers

734 search results - page 84 / 147
» Feature analysis for architectural evaluation methods
Sort
View
145
Voted
ICDAR
2009
IEEE
15 years 1 months ago
Online Handwritten Japanese Character String Recognition Using Conditional Random Fields
This paper describes an online handwritten Japanese character string recognition system based on conditional random fields, which integrates the information of character recogniti...
Xiang-Dong Zhou, Cheng-Lin Liu, Masaki Nakagawa
102
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Manuscript Bleed-through Removal via Hysteresis Thresholding
Many types of degradation can render ancient manuscripts very hard to read. In bleed-through, the text from the reverse, or verso, side of a page seeps through into the front, or ...
Rolando Estrada, Carlo Tomasi
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 8 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
132
Voted
FIW
2007
133views Communications» more  FIW 2007»
15 years 5 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
127
Voted
WACV
2008
IEEE
15 years 10 months ago
Tracking Down Under: Following the Satin Bowerbird
Sociobiologists collect huge volumes of video to study animal behavior (our collaborators work with 30,000 hours of video). The scale of these datasets demands the development of ...
Aniruddha Kembhavi, Ryan Farrell, Yuancheng Luo, D...