Sciweavers

809 search results - page 87 / 162
» Experiments with Cost-Sensitive Feature Evaluation
Sort
View
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
15 years 9 months ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng
127
Voted
ICRA
2002
IEEE
99views Robotics» more  ICRA 2002»
15 years 9 months ago
Method for Controlling Master-Slave Robots using Switching and Elastic Elements
— A new type of master-slave control methodology, which has the merits of both unilateral and bilateral ones, is proposed. The methodology is built on switching the unilateral fe...
Ikuo Yamano, Kenjiro Takemura, Ken Endo, Takashi M...
AVBPA
2001
Springer
114views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Speaker Discriminative Weighting Method for VQ-Based Speaker Identification
: We consider the matching function in vector quantization based speaker identification system. The model of a speaker is a codebook generated from the set of feature vectors from ...
Tomi Kinnunen, Pasi Fränti
CDC
2009
IEEE
155views Control Systems» more  CDC 2009»
15 years 8 months ago
Improved independent component regression modeling
The conventional independent component regression (ICR), as an exclusive two-step implementation algorithm, has the risk similar to principal component regression (PCR). That is, t...
Chunhui Zhao, Furong Gao, Tao Liu, Fuli Wang
DAGM
2006
Springer
15 years 7 months ago
Properties of Patch Based Approaches for the Recognition of Visual Object Classes
Abstract. Patch based approaches have recently shown promising results for the recognition of visual object classes. This paper investigates the role of different properties of pat...
Alexandra Teynor, Esa Rahtu, Lokesh Setia, Hans Bu...