Sciweavers

977 search results - page 190 / 196
» An Algebraic Approach to Data Mining: Some Examples
Sort
View
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 8 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
C5
2005
IEEE
14 years 10 days ago
Filters and Tasks in Croquet
Croquet [11,12] is a collaborative 3D platform that allows users to work together to create and share ideas. From the beginning we have worked to ensure that the Croquet interface...
David A. Smith, Andreas Raab, Yoshiki Ohshima, Dav...
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
14 years 8 months ago
Asymmetric Batch Incremental View Maintenance
Incremental view maintenance has found a growing number of applications recently, including data warehousing, continuous query processing, publish/subscribe systems, etc. Batch pr...
Hai Yu, Hao He, Jun Yang 0001, Junyi Xie
ESOP
2009
Springer
14 years 1 months ago
Practical Variable-Arity Polymorphism
Just as some functions have uniform behavior over distinct types, other functions have uniform behavior over distinct arities. These variable-arity functions are widely used in scr...
T. Stephen Strickland, Sam Tobin-Hochstadt, Matthi...
IH
2007
Springer
14 years 26 days ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...