Sciweavers

71 search results - page 10 / 15
» Parallel Implementation of Features Extraction Using Morphol...
Sort
View
JCS
2010
135views more  JCS 2010»
15 years 18 days ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
105
Voted
ICPR
2004
IEEE
16 years 3 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
132
Voted
PPOPP
1999
ACM
15 years 6 months ago
Automatic Parallelization of Divide and Conquer Algorithms
Divide and conquer algorithms are a good match for modern parallel machines: they tend to have large amounts of inherent parallelism and they work well with caches and deep memory...
Radu Rugina, Martin C. Rinard
MVA
1996
102views Computer Vision» more  MVA 1996»
15 years 3 months ago
Real-Time Recognition of Signaling Lights in Road Traffic
A method for recognizing signal lights in traffic scenes in real time has been developed. It consists of a set of different feature extraction operations acting as sequential filt...
Lampros Tsinas, Volker Graefe
ETVC
2008
15 years 4 months ago
Statistical Computing on Manifolds: From Riemannian Geometry to Computational Anatomy
Computational anatomy is an emerging discipline that aims at analyzing and modeling the individual anatomy of organs and their biological variability across a population. The goal ...
Xavier Pennec