Sciweavers

4088 search results - page 779 / 818
» Bitwise Neural Networks
Sort
View
TSMC
2002
134views more  TSMC 2002»
13 years 8 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
TSMC
2002
110views more  TSMC 2002»
13 years 8 months ago
Complexity reduction for "large image" processing
We present a method for sampling feature vectors in large (e.g., 2000 5000 16 bit) images that finds subsets of pixel locations which represent "regions" in the image. Sa...
Nikhil R. Pal, James C. Bezdek
MONET
2007
106views more  MONET 2007»
13 years 8 months ago
Shakra: Tracking and Sharing Daily Activity Levels with Unaugmented Mobile Phones
This paper explores the potential for use of an unaugmented commodity technology—the mobile phone— as a health promotion tool. We describe a prototype application that tracks t...
Ian Anderson, Julie Maitland, Scott Sherwood, Loui...
PR
2007
101views more  PR 2007»
13 years 8 months ago
Use of power law models in detecting region of interest
In this paper, we shall address the issue of semantic extraction of different regions of interest. The proposed approach is based on statistical methods and models inspired from l...
Yves Caron, Pascal Makris, Nicole Vincent
PRL
2008
137views more  PRL 2008»
13 years 8 months ago
On-line handwritten digit recognition based on trajectory and velocity modeling
The handwriting is one of the most familiar communication media. Pen based interface combined with automatic handwriting recognition offers a very easy and natural input method. T...
Monji Kherallah, Lobna Haddad, Adel M. Alimi, Amar...