Sciweavers

18374 search results - page 3628 / 3675
» Applications for data hiding
Sort
View
NN
2008
Springer
158views Neural Networks» more  NN 2008»
13 years 7 months ago
Improved mapping of information distribution across the cortical surface with the support vector machine
The early visual cortices represent information of several stimulus attributes, such as orientation and color. To understand the coding mechanisms of these attributes in the brain...
Youping Xiao, Ravi Rao, Guillermo A. Cecchi, Ehud ...
PERCOM
2008
ACM
13 years 7 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
PR
2008
100views more  PR 2008»
13 years 7 months ago
Boundary based shape orientation
The computation of a shape's orientation is a common task in the area of computer vision and image processing, being used for example to define a local frame of reference and...
Jovisa D. Zunic, Milos Stojmenovic
PAMI
2006
186views more  PAMI 2006»
13 years 7 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
SIAMCO
2008
108views more  SIAMCO 2008»
13 years 7 months ago
A Viability Theorem for Morphological Inclusions
The aim of this paper is to adapt the Viability Theorem from differential inclusions (governing the evolution of vectors in a finite dimensional space) to so-called morphological i...
Thomas Lorenz
« Prev « First page 3628 / 3675 Last » Next »