Sciweavers

7886 search results - page 1485 / 1578
» An evaluation of bipartitioning techniques
Sort
View
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 1 months ago
Digital Documents and Media
People need to find, work with, and put together information. Diverse activities, such as scholarly research, comparison shopping, and entertainment involve collecting and connect...
Michael A. Shepherd
ICDAR
2003
IEEE
14 years 1 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
ICDM
2003
IEEE
95views Data Mining» more  ICDM 2003»
14 years 1 months ago
Evolutionary Gabor Filter Optimization with Application to Vehicle Detection
Abstract—Despite the considerable amount of research work on the application of Gabor filters in pattern classification, their design and selection have been mostly done on a t...
Zehang Sun, George Bebis, Ronald Miller
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
14 years 1 months ago
An experimental study of hybrid switched system approaches to visual servoing
Abstract— In the recent past, many researchers have developed control algorithms for visual servo applications. In this paper, we introduce a new hybrid switched system approach,...
Nicholas R. Gans, Seth Hutchinson
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
14 years 1 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
« Prev « First page 1485 / 1578 Last » Next »