Sciweavers

4207 search results - page 622 / 842
» Stable Analysis Patterns
Sort
View
IH
2004
Springer
15 years 7 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
101
Voted
WEBI
2004
Springer
15 years 7 months ago
An Integrated Approach to Discovery in Complex Information Spaces
As the amount of available data continues to increase, more and more effective means for discovering important patterns and relationships within that data are required. Although t...
Daryl H. Hepting, Cory J. Butz
CGO
2003
IEEE
15 years 7 months ago
Speculative Register Promotion Using Advanced Load Address Table (ALAT)
The pervasive use of pointers with complicated patterns in C programs often constrains compiler alias analysis to yield conservative register allocation and promotion. Speculative...
Jin Lin, Tong Chen, Wei-Chung Hsu, Pen-Chung Yew
ICDAR
2003
IEEE
15 years 7 months ago
Generation of Hierarchical Dictionary for Stroke-order Free Kanji Handwriting Recognition Based on Substroke HMM
This paper describes a method of generating a Kanji hierarchical structured dictionary for stroke-number and stroke-order free handwriting recognition based on substroke HMM. In s...
Mitsuru Nakai, Hiroshi Shimodaira, Shigeki Sagayam...
ICDAR
2003
IEEE
15 years 7 months ago
Numeral recognition for quality control of surgical sachets
In this paper we describe an application of OCR techniques to quality control in industrial production. The purpose of the system is to verify the correct printing of numerical in...
Ernest Valveny, Antonio López