Sciweavers

5234 search results - page 329 / 1047
» Method Components - Rationale Revealed
Sort
View
ICDS
2009
IEEE
15 years 11 months ago
Local Contrast Segmentation to Binarize Images
—In this paper, a new binarization algorithm for degraded document images is proposed. The method is based on positive and negative pixel energies using the Laplacian of an image...
Marco Block, Raúl Rojas
96
Voted
ICDAR
2009
IEEE
15 years 11 months ago
Semi-automatic Roof Reconstruction
A semi-automatic 3D roof reconstruction method is proposed in this paper. It consists of two components: automatic recognition of 2D plane drawings and interactively “pulling”...
Tong Lu, Yubin Yang, Feng Su, Zhengxing Sun
ISI
2005
Springer
15 years 10 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
HUC
2003
Springer
15 years 9 months ago
User-Friendly Surveying Techniques for Location-Aware Systems
Abstract. Many location-aware applications rely on data from fine-grained location systems. During deployment such systems require a survey, specifying the locations of their envi...
James Scott, Mike Hazas
ICCAD
1997
IEEE
78views Hardware» more  ICCAD 1997»
15 years 8 months ago
A signature based approach to regularity extraction
Regularity extraction is an important step in the design ow of datapath-dominated circuits. This paper outlines a new method that automatically extracts regular structures from th...
Srinivasa Rao Arikati, Ravi Varadarajan