Sciweavers

825 search results - page 36 / 165
» Internal Iteration Externalized
Sort
View
26
Voted
ACL
1997
13 years 9 months ago
Incorporating Context Information for the Extraction of Terms
The information used for the extraction of terms can be considered as rather 'internal', i.e. coming from the candidate string itself. This paper presents the incorporat...
Katerina T. Frantzi
BC
2000
75views more  BC 2000»
13 years 7 months ago
Predictions derived from modelling the hippocampal role in navigation
A computational model of the lesion and single unit data from navigation in rats is reviewed. The model uses external (visual) and internal (odometric) information from the environ...
Neil Burgess, Andrew Jackson, Tom Hartley, John O'...
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
SIGIR
2010
ACM
13 years 8 months ago
Visual summarization of web pages
Visual summarization is an attractive new scheme to summarize web pages, which can help achieve a more friendly user experience in search and re-finding tasks by allowing users qu...
Binxing Jiao, Linjun Yang, Jizheng Xu, Feng Wu
ICIP
2004
IEEE
14 years 9 months ago
Defect detection on hardwood logs using high resolution three dimensional laser scan data
The location, type, and severity of external defects on hardwood logs and stems are the primary indicators of overall log quality and value. External defects provide hints about t...
Liya Thomas, Lamine Mili, Clifford A. Shaffer, Ed ...