Sciweavers

554 search results - page 26 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
ASIAMS
2008
IEEE
13 years 9 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
PR
2010
179views more  PR 2010»
13 years 6 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
SAC
2005
ACM
14 years 1 months ago
Automatic wrapper maintenance for semi-structured web sources using results from previous queries
During the last years, significant attention has been paid to the problem of building wrappers for extracting data from semistructured web sources. Nevertheless, since web sources...
Juan Raposo, Alberto Pan, Manuel Álvarez, &...
EDM
2009
125views Data Mining» more  EDM 2009»
13 years 5 months ago
A Data Mining Approach to Reveal Representative Collaboration Indicators in Open Collaboration Frameworks
Data mining methods are successful in educational environments to discover new knowledge or learner skills or features. Unfortunately, they have not been used in depth with collabo...
Antonio R. Anaya, Jesus Boticario
SEMWEB
2009
Springer
14 years 2 months ago
Automatically Constructing Semantic Web Services from Online Sources
Abstract. The work on integrating sources and services in the Semantic Web assumes that the data is either already represented in RDF or OWL or is available through a Semantic Web ...
José Luis Ambite, Sirish Darbha, Aman Goel,...