Sciweavers

71 search results - page 10 / 15
» Parallel Implementation of Features Extraction Using Morphol...
Sort
View
JCS
2010
135views more  JCS 2010»
13 years 5 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
ICPR
2004
IEEE
14 years 7 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
PPOPP
1999
ACM
13 years 11 months ago
Automatic Parallelization of Divide and Conquer Algorithms
Divide and conquer algorithms are a good match for modern parallel machines: they tend to have large amounts of inherent parallelism and they work well with caches and deep memory...
Radu Rugina, Martin C. Rinard
MVA
1996
102views Computer Vision» more  MVA 1996»
13 years 8 months ago
Real-Time Recognition of Signaling Lights in Road Traffic
A method for recognizing signal lights in traffic scenes in real time has been developed. It consists of a set of different feature extraction operations acting as sequential filt...
Lampros Tsinas, Volker Graefe
ETVC
2008
13 years 8 months ago
Statistical Computing on Manifolds: From Riemannian Geometry to Computational Anatomy
Computational anatomy is an emerging discipline that aims at analyzing and modeling the individual anatomy of organs and their biological variability across a population. The goal ...
Xavier Pennec