Sciweavers

3806 search results - page 679 / 762
» The Power of Process
Sort
View
ICIP
2010
IEEE
15 years 2 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
232
Voted
ICIP
2010
IEEE
15 years 2 months ago
Building Emerging Pattern (EP) Random forest for recognition
The Random forest classifier comes to be the working horse for visual recognition community. It predicts the class label of an input data by aggregating the votes of multiple tree...
Liang Wang, Yizhou Wang, Debin Zhao
120
Voted
IPPS
2010
IEEE
15 years 2 months ago
Optimization of linked list prefix computations on multithreaded GPUs using CUDA
We present a number of optimization techniques to compute prefix sums on linked lists and implement them on multithreaded GPUs using CUDA. Prefix computations on linked structures ...
Zheng Wei, Joseph JáJá
BMCBI
2011
14 years 11 months ago
Systematic error detection in experimental high-throughput screening
Background: High-throughput screening (HTS) is a key part of the drug discovery process during which thousands of chemical compounds are screened and their activity levels measure...
Plamen Dragiev, Robert Nadon, Vladimir Makarenkov
TIP
2010
131views more  TIP 2010»
14 years 11 months ago
Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints
We present a new framework for data hiding in images printed with clustered dot halftones. Our application scenario, like other hardcopy embedding methods, encounters fundamental c...
Orhan Bulan, Gaurav Sharma, Vishal Monga