Sciweavers

766 search results - page 94 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ICDAR
1995
IEEE
14 years 21 days ago
Handwritten word recognition for real-time applications
—A fast method of handwritten word recognition suitable for real time applications is presented in this paper. Preprocessing, segmentation and feature extraction are implemented ...
Gyeonghwan Kim, Venu Govindaraju
VIROLOGY
2008
95views more  VIROLOGY 2008»
13 years 9 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
12 years 4 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
AIRWEB
2009
Springer
14 years 3 months ago
Looking into the past to better classify web spam
Web spamming techniques aim to achieve undeserved rankings in search results. Research has been widely conducted on identifying such spam and neutralizing its influence. However,...
Na Dai, Brian D. Davison, Xiaoguang Qi
ICDAR
2007
IEEE
14 years 3 months ago
Perceptive Vision for Headline Localisation in Bangla Handwritten Text Recognition
In this paper, we propose to give tools for Bangla handwriting recognition. We present a mechanism to segment documents into text lines and words, and more specifically to detect...
Aurélie Lemaitre, B. B. Chaudhuri, Bertrand...