Sciweavers

625 search results - page 83 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
SIPS
2007
IEEE
14 years 1 months ago
Exit Chart Aided Irregular Convolutional Code Design for Iterative Downlink SDMA Systems Using Imperfect Channel State Informati
We analyze a precoded and iteratively detected downlink multiuser system employing imperfect Spatio-Temporal Channel Impulse Response at the Transmitters (ST-CIRT) with the aid of...
Chun-Yi Wei, Jin Wang, Lajos Hanzo
IJCAI
2003
13 years 9 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván
ICPR
2000
IEEE
14 years 8 months ago
Application of Planar Motion Segmentation for Scene Text Extraction
This paper explores an approach for extracting scene text from a sequence of images with relative motion between the camera and the scene. It is assumed that the scene text lies o...
Tarak Gandhi, Rangachar Kasturi, Sameer Antani
ICAPR
2001
Springer
14 years 3 days ago
Character Extraction from Interfering Background - Analysis of Double-Sided Handwritten Archival Documents
The sipping of ink through the pages of certain double-sided handwritten documents after long periods of storage poses a serious problem to human readers or OCR systems. This pape...
Chew Lim Tan, Ruini Cao, Qian Wang, Peiyi Shen
ARC
2008
Springer
112views Hardware» more  ARC 2008»
13 years 9 months ago
Lossless Compression for Space Imagery in a Dynamically Reconfigurable Architecture
Abstract. This paper presents a novel dynamically reconfigurable hardware architecture for lossless compression and its optimization for space imagery. The proposed system makes us...
Xiaolin Chen, Cedric Nishan Canagarajah, Raffaele ...