Sciweavers

470 search results - page 25 / 94
» Reading a Neural Code
Sort
View
ICASSP
2011
IEEE
14 years 5 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
STOC
2012
ACM
201views Algorithms» more  STOC 2012»
13 years 4 months ago
From irreducible representations to locally decodable codes
Locally Decodable Code (LDC) is a code that encodes a message in a way that one can decode any particular symbol of the message by reading only a constant number of locations, eve...
Klim Efremenko
ICASSP
2011
IEEE
14 years 11 months ago
Searching in one billion vectors: re-rank with source coding
Recent indexing techniques inspired by source coding have been shown successful to index billions of high-dimensional vectors in memory. In this paper, we propose an approach that ...
Hervé Jégou and Romain Tavenard and Matthijs Dou...
CSMR
2005
IEEE
15 years 7 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse
ICDAR
2003
IEEE
15 years 7 months ago
A Contour Code Feature Based Segmentation For Handwriting Recognition
The purpose of this paper is to present a novel contour code feature in conjunction with a rule based segmentation for cursive handwriting recognition. A heuristic segmentation al...
Brijesh Verma