Sciweavers

2421 search results - page 279 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CLEAR
2006
Springer
158views Biometrics» more  CLEAR 2006»
15 years 8 months ago
Audio, Video and Multimodal Person Identification in a Smart Room
In this paper, we address the modality integration issue on the example of a smart room environment aiming at enabling person identification by combining acoustic features and 2D f...
Jordi Luque, Ramon Morros, Ainara Garde, Jan Angui...
131
Voted
JELIA
2010
Springer
15 years 3 months ago
Retroactive Subsumption-Based Tabled Evaluation of Logic Programs
Abstract. Tabled evaluation is a recognized and powerful implementation technique that overcomes some limitations of traditional Prolog systems in dealing with recursion and redund...
Flávio Cruz, Ricardo Rocha
DEXAW
1999
IEEE
119views Database» more  DEXAW 1999»
15 years 9 months ago
Structure-Based Similarity Search with Graph Histograms
Objects like road networks, CAD/CAM components, electrical or electronic circuits, molecules, can be represented as graphs, in many modern applications. In this paper, we propose ...
Apostolos Papadopoulos, Yannis Manolopoulos
CODES
2004
IEEE
15 years 8 months ago
Optimizing the memory bandwidth with loop fusion
The memory bandwidth largely determines the performance and energy cost of embedded systems. At the compiler level, several techniques improve the memory bandwidth at the scope of...
Paul Marchal, José Ignacio Gómez, Fr...
DAS
2008
Springer
15 years 6 months ago
Multi-oriented Text Line Extraction from Handwritten Arabic Documents
In this paper, we present a novel approach for the multi-oriented text line extraction from handwritten Arabic documents. After image pre-processing, the local orientations are de...
Nazih Ouwayed, Abdel Belaïd