Sciweavers

11097 search results - page 1937 / 2220
» Hera presentation generator
Sort
View
GECCO
2000
Springer
122views Optimization» more  GECCO 2000»
15 years 8 months ago
Genetic Programming with Statically Scoped Local Variables
This paper presents an extension to genetic programming to allow the evolution of programs containing local variables with static scope which obey the invariant that all variables...
Evan Kirshenbaum
DAS
2010
Springer
15 years 8 months ago
Handwritten Arabic text line segmentation using affinity propagation
In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps Coarse text ...
Jayant Kumar, Wael Abd-Almageed, Le Kang, David S....
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 6 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
CLOR
2006
15 years 6 months ago
An Implicit Shape Model for Combined Object Categorization and Segmentation
We present a method for object categorization in real-world scenes. Following a common consensus in the field, we do not assume that a figure-ground segmentation is available prior...
Bastian Leibe, Ales Leonardis, Bernt Schiele
CSREASAM
2006
15 years 6 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
« Prev « First page 1937 / 2220 Last » Next »