Sciweavers

550 search results - page 72 / 110
» pairing 2009
Sort
View
ICDAR
2009
IEEE
15 years 10 months ago
Seal Detection and Recognition: An Approach for Document Indexing
Reliable indexing of documents having seal instances can be achieved by recognizing seal information. This paper presents a novel approach for detecting and classifying such multi...
Partha Pratim Roy, Umapada Pal, Josep Lladó...
140
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Utilizing Consistency Context for Handwritten Mathematical Expression Recognition
This paper presents a rule-based approach that utilizes some types of contextual information to improve the accuracy of handwritten mathematical expression(ME) recognition. Mining...
Kang Kim, Taik-Heon Rhee, Jae Seung Lee, Jin Hyung...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
15 years 10 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
164
Voted
WIMOB
2009
IEEE
15 years 10 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann