Sciweavers

1693 search results - page 244 / 339
» fast 2008
Sort
View
TIP
1998
109views more  TIP 1998»
13 years 10 months ago
Extraction of signatures from check background based on a filiformity criterion
—Extracting a signature from a check with patterned background is a thorny problem in image segmentation. Methods based on threshold techniques often necessitate meticulous postp...
Salim Djeziri, Fathallah Nouboud, Réjean Pl...
TIP
1998
162views more  TIP 1998»
13 years 10 months ago
Variational image segmentation using boundary functions
Abstract—A general variational framework for image approximation and segmentation is introduced. By using a continuous “line-process” to represent edge boundaries, it is poss...
Gary A. Hewer, Charles S. Kenney, B. S. Manjunath
TIT
1998
91views more  TIT 1998»
13 years 10 months ago
Multiaccess Fading Channels-Part II: Delay-Limited Capacities
—In multiaccess wireless systems, dynamic allocation of resources such as transmit power, bandwidths, and rates is an important means to deal with the time-varying nature of the ...
Stephen V. Hanly, David N. C. Tse
TON
1998
112views more  TON 1998»
13 years 10 months ago
IP switching - ATM under IP
IP traffic on the Internet and private enterprise networks has been growing exponentially for some time. This growth is beginning to stress the traditional, processor based design...
Peter Newman, Greg Minshall, Thomas L. Lyon
TSMC
1998
90views more  TSMC 1998»
13 years 10 months ago
Redundancy problem in writing: from human to anthropomorphic robot arm
Abstract—This paper presents the analysis of motion of a redundant anthropomorphic arm during the writing. The modeling is based on the separation of the prescribed movement into...
Veljko Potkonjak, Mirjana Popovic, Mihailo Lazarev...