Sciweavers

1748 search results - page 106 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
103
Voted
ICDAR
2003
IEEE
15 years 7 months ago
New Approach for the Skeletonization of Handwritten Characters in Gray-Level Images
Existing skeletonization methods operate directly on the binary image ignoring the gray-level information. In this paper we propose a new method for the skeletonization of handwri...
Amer Dawoud, Mohamed Kamel
143
Voted
DAS
2010
Springer
15 years 1 months ago
Automatic unsupervised parameter selection for character segmentation
A major difficulty for designing a document image segmentation methodology is the proper value selection for all involved parameters. This is usually done after experimentations o...
Georgios Vamvakas, Nikolaos Stamatopoulos, Basilio...
123
Voted
ICON
2007
IEEE
15 years 9 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
125
Voted
KBSE
2009
IEEE
15 years 9 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie
105
Voted
KES
2005
Springer
15 years 8 months ago
Feature Generation by Simple FLD
This paper presents a new algorithm for feature generation, which is approximately derived based on geometrical interpretation of the Fisher linear discriminant analysis. In a fiel...
Minoru Fukumi, Yasue Mitsukura