Sciweavers

1875 search results - page 140 / 375
» Kernel Methods for Pattern Analysis
Sort
View
107
Voted
ICDAR
2009
IEEE
15 years 7 months ago
Learning and Adaptation for Improving Handwritten Character Recognizers
Writer independent handwriting recognition systems are limited in their accuracy, primarily due the large variations in writing styles of most characters. Samples from a single ch...
Naveen Chandra Tewari, Anoop M. Namboodiri
120
Voted
PAMI
2012
13 years 3 months ago
A Blur-Robust Descriptor with Applications to Face Recognition
—Understanding the effect of blur is an important problem in unconstrained visual analysis. We address this problem in the context of image-based recognition, by a fusion of imag...
Raghuraman Gopalan, Sima Taheri, Pavan K. Turaga, ...
ICPP
1998
IEEE
15 years 4 months ago
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals
This paper presents a new schedulability analysis methodology for distributed hard real-time systems with bursty job arrivals. The schedulability is analyzed by comparing worst-ca...
Chengzhi Li, Riccardo Bettati, Wei Zhao
85
Voted
APVIS
2007
15 years 2 months ago
Visualization and analysis of email networks
This paper presents various methods for visualization and analysis of email networks; visualization on the surface of a sphere to reveal communication patterns between different g...
Xiaoyan Fu, Seok-Hee Hong, Nikola S. Nikolov, Xiao...
100
Voted
CN
2007
133views more  CN 2007»
15 years 18 days ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...