For opinion finding task our method of the combination of 5 Windows method and Pseudo Relevance Feedback behaves well, achieving an improvement of over 20% on the baseline adhoc r...
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
Abstract. This paper introduces a novel method for ultrasound (US) probe calibration based on closed-form formulation and using minimal US imaging allowing for an immediate result....
Anand Viswanathan, Emad Boctor, Russell H. Taylor,...
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...