Sciweavers

1028 search results - page 176 / 206
» Character sets of strings
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
14 years 2 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
AB
2008
Springer
14 years 1 months ago
Local Structure and Behavior of Boolean Bioregulatory Networks
Abstract. A well-known discrete approach to modeling biological regulatory networks is the logical framework developed by R. Thomas. The network structure is captured in an interac...
Heike Siebert
IUI
2006
ACM
14 years 1 months ago
How to talk to a hologram
There is a growing need for creating life-like virtual human simulations that can conduct a natural spoken dialog with a human student on a predefined subject. We present an over...
Anton Leuski, Jarrell Pair, David R. Traum, Peter ...
ICDAR
2003
IEEE
14 years 27 days ago
An Approach to Extracting the Target Text Line from a Document Image Captured by a Pen Scanner
In this paper, we present a new approach to extracting the target text line from a document image captured by a pen scanner. Given the binary image, a set of possible text lines a...
Zhen-Long Bai, Qiang Huo
ICDAR
2003
IEEE
14 years 27 days ago
A Retargetable Framework for Interactive Diagram Recognition
The design of new diagram recognition systems remains a challenging problem. Ideally, recognition systems should accept real-world input, perform robustly, fail gracefully, and be...
Edward Lank