Sciweavers

355 search results - page 43 / 71
» Risk Analysis of Robust System Design
Sort
View
ICDAR
2011
IEEE
13 years 9 months ago
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning
—Reading text from photographs is a challenging problem that has received a signicant amount of attention. Two key components of most systems are (i) text detection from images a...
Adam Coates, Blake Carpenter, Carl Case, Sanjeev S...
CDC
2010
IEEE
118views Control Systems» more  CDC 2010»
14 years 4 months ago
Networked clock synchronization based on second order linear consensus algorithms
In this paper a distributed algorithm for clock synchronization is proposed. This algorithm is based on an extension of the consensus algorithm able to synchronize a family of dou...
Ruggero Carli, Sandro Zampieri
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
15 years 2 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
MBEC
2010
122views Communications» more  MBEC 2010»
14 years 4 months ago
Real-time estimation of cerebrospinal fluid system parameters via oscillating pressure infusion
Abstract Hydrocephalus is related to a disturbed cerebrospinal fluid (CSF) system. For diagnosis, lumbar infusion test are performed to estimate outflow conductance, Cout, and pres...
Kennet Andersson, Ian R. Manchester, Jan Malm, And...
ICDCS
2007
IEEE
15 years 4 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...