Reducing Errors in Computer Recognition of Handwritten Material

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=eV3-3HF0iNs



Duration: 1:15:57
94 views
1


Research activities at our research centre will be described, including handwriting recognition, OCR and legibility of printfonts. After that, this talk will focus on methods of reducing errors in handwriting recognition, covering the following topics: (a) Handwriting education and styles (b) Preprocessing techniques and recognition algorithms (c) Shape analysis and selection of representative models (d) Choice of multiple classifiers, co-operation and combination procedures, serial and parallel operations (e) Distance measurements and decision analysis, recognition and rejection trade-offs (f) Verification of detailed and distinctive features (g) Systematic steps towards an error-free recognition system Recent CENPARMI results will be illustrated.




Other Videos By Microsoft Research


2016-09-05WeΓÇÖre Friends, Right?: Inside KidsΓÇÖ Culture [1/4]
2016-09-05Accelerated Democracy: How technology might change voting
2016-09-05When Can Formal Methods Make a Real Difference?
2016-09-05Dynamic Semantics of Programming Languages and Applications to Testing
2016-09-05Error Detection using Shape Analysis with Local Reasoning
2016-09-05Type-Safe, Generative, Binding Macros
2016-09-05Social Network Analysis meets the Semantic Web: What FOAF Reveals About LiveJournal
2016-09-05Distributed Multi-robot Exploration and Mapping
2016-09-051.Vision: Extraordinary Computing Experiences & 2. Robots for the Masses: Fiction or Reality
2016-09-05Modeling and Facilitating Human Communication [1/5]
2016-09-05Reducing Errors in Computer Recognition of Handwritten Material
2016-09-05Information wants to be free (but is everywhere in chains)
2016-09-05The art and technology of electronic textiles
2016-09-05Quantum Loop Gas Approach to Topological Phases of Correlated Electrons
2016-09-05Computational History In Action: Discovering Gutenberg's Printing Process
2016-09-05A World Filled With Cameras: Security at the Cost of Freedom? Or Can We Have Both?
2016-09-05Resisting Denial of Service Attacks by Puzzle Outsourcing
2016-09-05Transition Invariants
2016-09-05Declarative querying of sensor networks through automatic service planning
2016-09-05Folklore of Network Protocol Design (Anita Borg Lecture)
2016-09-05Toolkit for Construction and Maintenance of Extensible Proof Search Tactics



Tags:
microsoft research