Sciweavers

1395 search results - page 206 / 279
» Microarray image analysis based on an evolutionary approach
Sort
View
ICIAR
2010
Springer
14 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
WSCG
2004
139views more  WSCG 2004»
13 years 10 months ago
Objects Matching Improvement Using Optimization Techniques in a Geometric Modal Methodology
This work was based on a previously developed methodology using shape modal description for matching image objects. With this methodology, the objects points were matched using a ...
Luísa Ferreira Bastos, João Manuel R...
RAS
2002
92views more  RAS 2002»
13 years 8 months ago
Information Sampling for vision-based robot navigation
This paper proposes a statistical, non-feature based, attention mechanism for a mobile robot, termed Information Sampling. The selected data may be a single pixel or a number scat...
Niall Winters, José Santos-Victor
ICDAR
2009
IEEE
13 years 7 months ago
ICDAR 2009 Handwriting Segmentation Contest
The Handwriting Segmentation Contest was organized in the context of ICDAR2009 conference in order to record recent advances in off-line handwriting segmentation. This paper descr...
Basilios Gatos, Nikolaos Stamatopoulos, Georgios L...
ICDAR
2009
IEEE
14 years 3 months ago
Script-Independent Handwritten Textlines Segmentation Using Active Contours
Handwritten document images contain textlines with multi orientations, touching and overlapping characters within consecutive textlines, and small inter-line spacing making textli...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...