Sciweavers

5740 search results - page 1063 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
14 years 2 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
IFM
2009
Springer
107views Formal Methods» more  IFM 2009»
14 years 2 months ago
Realizability of Choreographies Using Process Algebra Encodings
Abstract. Service-oriented computing has emerged as a new programming paradigm that aims at implementing software applications which can be used through a network via the exchange ...
Gwen Salaün, Tevfik Bultan
ISMIS
2005
Springer
14 years 1 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
CIKM
2001
Springer
14 years 8 days ago
Automatic Discovery of Salient Segments in Imperfect Speech Transcripts
This paper addresses the problem of automatic detection of salient video segments for real-world applications such as corporate training based on associated speech transcriptions....
Dulce B. Ponceleon, Savitha Srinivasan
MICCAI
2000
Springer
13 years 11 months ago
Segmentation by Adaptive Geodesic Active Contours
This paper introduces the use of spatially adaptive components into the geodesic active contour segmentation method for application to volumetric medical images. These components a...
Carl-Fredrik Westin, Liana M. Lorigo, Olivier D. F...
« Prev « First page 1063 / 1148 Last » Next »