Sciweavers

5234 search results - page 283 / 1047
» Method Components - Rationale Revealed
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
ICDAR
2011
IEEE
14 years 3 months ago
Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis
—This paper presents a new method for localization of digit strings with a specific syntax in Farsi/ Arabic document images. First, some features are extracted from all connected...
Ali Abedi, Karim Faez
CVPR
2008
IEEE
16 years 6 months ago
Computing minimal deformations: application to construction of statistical shape models
Nonlinear registration is mostly performed after initialization by a global, linear transformation (in this work, we focus on similarity transformations), computed by a linear reg...
Darko Zikic, Michael Sass Hansen, Ben Glocker, Ali...
TACAS
2007
Springer
165views Algorithms» more  TACAS 2007»
15 years 10 months ago
Unfolding Concurrent Well-Structured Transition Systems
Abstract. Our main objective is to combine partial-order methods with verification techniques for infinite-state systems in order to obtain efficient verification algorithms fo...
Frédéric Herbreteau, Grégoire...
FDL
2005
IEEE
15 years 9 months ago
Meta Modelling of Embedded Systems using Active Databases
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Dieter Monjau, Mathias Sporer