Sciweavers

134 search results - page 20 / 27
» Sign Haar Transform
Sort
View
IJCV
2000
136views more  IJCV 2000»
13 years 8 months ago
A Trainable System for Object Detection
This paper presents a general, trainable system for object detection in unconstrained, cluttered scenes. The system derives much of its power from a representation that describes a...
Constantine Papageorgiou, Tomaso Poggio
MICCAI
2010
Springer
13 years 6 months ago
Texture Guided Active Appearance Model Propagation for Prostate Segmentation
Fusion of Magnetic Resonance Imaging (MRI) and Trans Rectal Ultra Sound (TRUS) images during TRUS guided prostate biopsy improves localization of the malignant tissues. Segmented p...
Soumya Ghose, Arnau Oliver, Robert Marti, Xavier L...
CC
2004
Springer
134views System Software» more  CC 2004»
14 years 10 days ago
Widening Integer Arithmetic
Abstract. Some codes require computations to use fewer bits of precision than are normal for the target machine. For example, Java requires 32-bit arithmetic even on a 64-bit targe...
Kevin Redwine, Norman Ramsey
CSL
2007
Springer
13 years 8 months ago
Iterative reconstruction of speech from short-time Fourier transform phase and magnitude spectra
In this paper, we consider the topic of iterative, one dimensional, signal reconstruction (specifically speech signals) from the magnitude spectrum and the phase spectrum. While ...
Leigh D. Alsteris, Kuldip K. Paliwal
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
14 years 2 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang