Sciweavers

3771 search results - page 59 / 755
» Subobject Transformation Systems
Sort
View
PRL
2006
100views more  PRL 2006»
15 years 2 months ago
The utilization of a Taylor series-based transformation in fingerprint verification
Dealing with non-linear distortion in fingerprint images is a major difficulty for automated fingerprint verification systems. While this distortion can be a nuisance in minutiae ...
Peter Meenen, Ashkan Ashrafi, Reza R. Adhami
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
15 years 8 months ago
Loop Transformation Methodologies for Array-Oriented Memory Management
Abstract – The storage requirements in data-dominant signal processing systems, whose behavior is described by arraybased, loop-organized algorithmic specifications, have an imp...
Florin Balasa, Per Gunnar Kjeldsberg, Martin Palko...
ICIP
2006
IEEE
15 years 8 months ago
A Hierarchical Approach to Rotation-Invariant Texture Feature Extraction Based on Radon Transform Parameters
In this paper, we propose an efficient hierarchical method for extracting invariant texture features using the Gabor wavelets and Radon transform parameters. The proposed method a...
Mahmoud R. Hejazi, Yo-Sung Ho
ESSOS
2009
Springer
15 years 7 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
ASP
2001
Springer
15 years 7 months ago
Useful Transformations in Answer set programming
We define a reduction system Ë¿ which preserves the stable semantics. This system includes two types of transformation rules. One type (which we call ˾) preserves the stable...
Mauricio Osorio, Juan Carlos Nieves, Chris Giannel...