Sciweavers

4050 search results - page 657 / 810
» Information Extraction from Voicemail
Sort
View
ICDAR
2003
IEEE
14 years 2 months ago
Recovery of Writing Sequence of Static Images of Handwriting using UWM
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing...
Kai Kwong Lau, Pong Chi Yuen, Yuan Yan Tang
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
14 years 2 months ago
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms
Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
Brian S. Mitchell, Spiros Mancoridis
MIS
1999
Springer
193views Multimedia» more  MIS 1999»
14 years 1 months ago
Facilitating Spatio-Temporal Operations in a Versatile Video Database System
In a video database, large amount of information involving video, audio, and/or images needs to be stored and managed. Therefore, there is an important need for novel techniques a...
Shermann S.-M. Chan, Qing Li
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
14 years 1 months ago
Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data
Wepresent a novel, fast methodfor associationminingill high-dimensionaldatasets. OurCoincidence Detection method, which combines random sampling and Chernoff-Hoeffding bounds with...
Evan W. Steeg, Derek A. Robinson, Ed Willis
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
14 years 1 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa