Sciweavers

7413 search results - page 1344 / 1483
» Using Specularities for Recognition
Sort
View
ACE
2003
86views Education» more  ACE 2003»
13 years 9 months ago
A New Approach to a First Year Undergraduate Information Systems Course
This paper describes the development, implementation and evaluation of a new teaching approach for a large first year undergraduate course in information systems at the University...
Denise Tolhurst, Bob Baker
ESANN
2001
13 years 9 months ago
Graph extraction from color images
Abstract. An approach to symbolic contour extraction will be described that consists of three stages: enhancement, detection, and extraction of edges and corners. Edges and corners...
Tino Lourens, Kazuhiro Nakadai, Hiroshi G. Okuno, ...
GRAPHICSINTERFACE
2001
13 years 9 months ago
Aiding Manipulation of Handwritten Mathematical Expressions through Style-Preserving Morphs
We describe a technique for enhancing a user's ability to manipulate hand-printed symbolic information by automatically improving legibility and simultaneously providing imme...
Richard Zanibbi, Kevin Novins, James Arvo, Katheri...
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
EACL
2003
ACL Anthology
13 years 9 months ago
An Integrated Term-Based Corpus Query System
In this paper we describe the X-TRACT workbench, which enables efficient termbased querying against a domain-specific literature corpus. Its main aim is to aid domain specialists ...
Kostas Manios, Goran Nenadic, Irena Spasic, Sophia...
« Prev « First page 1344 / 1483 Last » Next »