Sciweavers

348 search results - page 48 / 70
» Offline firewall analysis
Sort
View
ICDAR
2011
IEEE
12 years 9 months ago
Co-training for Handwritten Word Recognition
—To cope with the tremendous variations of writing styles encountered between different individuals, unconstrained automatic handwriting recognition systems need to be trained on...
Volkmar Frinken, Andreas Fischer, Horst Bunke, Ali...
CCGRID
2008
IEEE
14 years 4 months ago
On the Optimization of Resource Utilization in Distributed Multimedia Applications
—The application and research area of Multimedia Content Analysis (MMCA) considers all aspects of the automated extraction of new knowledge from large multimedia data streams and...
R. Yang, Robert D. van der Mei, D. Roubos, Frank J...
ANCS
2008
ACM
13 years 11 months ago
A programmable architecture for scalable and real-time network traffic measurements
Accurate and real-time traffic measurement is becoming increasingly critical for large variety of applications including accounting, bandwidth provisioning and security analysis. ...
Faisal Khan, Lihua Yuan, Chen-Nee Chuah, Soheil Gh...
CVPR
2006
IEEE
14 years 11 months ago
Learning Patch Dependencies for Improved Pose Mismatched Face Verification
Most pose robust face verification algorithms, which employ 2D appearance, rely heavily on statistics gathered from offline databases containing ample facial appearance variation ...
Simon Lucey, Tsuhan Chen
CVPR
2006
IEEE
14 years 11 months ago
Performance Modeling and Prediction of Face Recognition Systems
It is a challenging task to accurately model the performance of a face recognition system, and to predict its individual recognition results under various environments. This paper...
Peng Wang, Qiang Ji