Sciweavers

2620 search results - page 197 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
SPIN
2007
Springer
14 years 2 months ago
Scalable Multi-core LTL Model-Checking
Recent development in computer hardware has brought more wide-spread emergence of shared-memory, multi-core systems. These architectures offer opportunities to speed up various ta...
Jiri Barnat, Lubos Brim, Petr Rockai
ICMCS
2005
IEEE
108views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Virtual camerawork for generating lecture video from high resolution images
We propose a method for generating a dynamic lecture video from the high resolution images recorded by a HDV camcorder. The lecture images are cropped to track the region of the i...
Takao Yokoi, Hironobu Fujiyoshi
WOWMOM
2005
ACM
86views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
The Wireless Opaque Channel to Contrast Information Leakage
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...
IUI
2003
ACM
14 years 1 months ago
Recommendations without user preferences: a natural language processing approach
We examine the problems with automated recommendation systems when information about user preferences is limited. We equate the problem to one of content similarity measurement an...
Michael Fleischman, Eduard H. Hovy
CAEPIA
2003
Springer
14 years 1 months ago
Using the Geometrical Distribution of Prototypes for Training Set Condensing
Abstract. In this paper, some new approaches to training set size reduction are presented. These schemes basically consist of defining a small number of prototypes that represent ...
María Teresa Lozano, José Salvador S...