Sciweavers

23413 search results - page 4670 / 4683
» or 2005
Sort
View
ICDAR
2011
IEEE
13 years 9 months ago
A New Fourier-Moments Based Video Word and Character Extraction Method for Recognition
— This paper presents a new method based on Fourier and moments features to extract words and characters from a video text line in any direction for recognition. Unlike existing ...
Deepak Rajendran, Palaiahnakote Shivakumara, Bolan...
BPM
2005
Springer
228views Business» more  BPM 2005»
15 years 3 months ago
Risk Management in the BPM Lifecycle
Business Process Management is considered an essential strategy to create and maintain competitive advantage by streamlining and monitoring corporate processes. While the identific...
Michael zur Muehlen, Danny Ting-Yi Ho
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
12 years 12 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
PAMI
2012
12 years 12 months ago
Quantifying and Transferring Contextual Information in Object Detection
— Context is critical for reducing the uncertainty in object detection. However, context modelling is challenging because there are often many different types of contextual infor...
Wei-Shi Zheng, Shaogang Gong, Tao Xiang
SIGIR
2012
ACM
12 years 12 months ago
Time-based calibration of effectiveness measures
Many current effectiveness measures incorporate simplifying assumptions about user behavior. These assumptions prevent the measures from reflecting aspects of the search process...
Mark D. Smucker, Charles L. A. Clarke
« Prev « First page 4670 / 4683 Last » Next »