Sciweavers

203 search results - page 33 / 41
» A Data Hiding Scheme Based on LBPROT Pattern
Sort
View
SDM
2009
SIAM
161views Data Mining» more  SDM 2009»
14 years 4 months ago
Feature Weighted SVMs Using Receiver Operating Characteristics.
Support Vector Machines (SVMs) are a leading tool in classification and pattern recognition and the kernel function is one of its most important components. This function is used...
Shaoyi Zhang, M. Maruf Hossain, Md. Rafiul Hassan,...
PR
2010
220views more  PR 2010»
13 years 6 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
JMLR
2010
120views more  JMLR 2010»
13 years 2 months ago
Effective Wrapper-Filter hybridization through GRASP Schemata
Of all of the challenges which face the selection of relevant features for predictive data mining or pattern recognition modeling, the adaptation of computational intelligence tec...
Mohamed Amir Esseghir
ICASSP
2011
IEEE
12 years 11 months ago
Denoising of image patches via sparse representations with learned statistical dependencies
We address the problem of denoising for image patches. The approach taken is based on Bayesian modeling of sparse representations, which takes into account dependencies between th...
Tomer Faktor, Yonina C. Eldar, Michael Elad
BTW
2003
Springer
103views Database» more  BTW 2003»
14 years 26 days ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert