Sciweavers

10910 search results - page 183 / 2182
» Input modeling using a computer algebra system
Sort
View
86
Voted
ICDAR
2003
IEEE
15 years 3 months ago
Text-indicated Writer Verification Using Hidden Markov Models
We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu
80
Voted
DLT
2008
14 years 11 months ago
Derivation Tree Analysis for Accelerated Fixed-Point Computation
We show that for several classes of idempotent semirings the least fixed-point of a polynomial system of equations X = f(X) is equal to the least fixed-point of a linear system obt...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
81
Voted
CIT
2007
Springer
15 years 2 months ago
An Approach for Assessment of Reliability of the System Using Use Case Model
Existing approaches on reliability assessment of the system have limitations such as performance entirely depends on expertise, knowledge of system analysts and computation of usa...
Debasish Kundu, Debasis Samanta
90
Voted
SIAMREV
2010
140views more  SIAMREV 2010»
14 years 5 months ago
What Shape Is Your Conjugate? A Survey of Computational Convex Analysis and Its Applications
Computational Convex Analysis algorithms have been rediscovered several times in the past by researchers from different fields. To further communications between practitioners, we ...
Yves Lucet
112
Voted
AVBPA
2005
Springer
228views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition
Abstract. In this paper, the use of biometric systems in forensic applications is reviewed. Main differences between the aim of commercial biometric systems and forensic reporting...
Daniel Ramos-Castro, Joaquin Gonzalez-Rodriguez, C...