Sciweavers

2351 search results - page 43 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
137
Voted
CAIP
2007
Springer
134views Image Analysis» more  CAIP 2007»
15 years 7 months ago
An Efficient Method for Filtering Image-Based Spam E-mail
Spam e-mail with advertisement text embedded in images presents a great challenge to anti-spam filters. In this paper, we present a fast method to detect image-based spam e-mail. U...
Ngo Phuong Nhung, Tu Minh Phuong
137
Voted
ISBI
2006
IEEE
15 years 9 months ago
Comparing optical-flow based methods for quantification of myocardial deformations on RT3D ultrasound
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable threedimensio...
Qi Duan, Elsa D. Angelini, Olivier Gérard, ...
106
Voted
BIOSYSTEMS
2008
84views more  BIOSYSTEMS 2008»
15 years 3 months ago
Decoding spike timing: The differential reverse-correlation method
It is widely acknowledged that detailed timing of action potentials is used to encode information, for example, in auditory pathways; however, the computational tools required to ...
Gasper Tkacik, Marcelo O. Magnasco
115
Voted
ICDAR
2009
IEEE
15 years 10 months ago
A Self-Adaptive Method for Extraction of Document-Specific Alphabets
Recognition and encoding of digitized historical documents is still a challenging and difficult task. A major problem is the occurrence of unknown glyphs and symbols which might n...
Stefan Pletschacher
147
Voted
COMPSAC
2007
IEEE
15 years 10 months ago
An Automatic Connector Generation Method for Dynamic Architecture
In a component-based system components are basic computation units implementing specific business functions, and their interactions are explicitly represented by connectors. If th...
Yiming Yang, Xin Peng, Wenyun Zhao