Sciweavers

1231 search results - page 210 / 247
» Association Rules
Sort
View
ICCV
2003
IEEE
14 years 9 months ago
Fusion of Static and Dynamic Body Biometrics for Gait Recognition
Human identification at a distance has recently gained growing interest from computer vision researchers. This paper aims to propose a visual recognition algorithm based upon fusi...
Liang Wang, Huazhong Ning, Tieniu Tan, Weiming Hu
ICIP
2004
IEEE
14 years 9 months ago
Defect detection on hardwood logs using high resolution three dimensional laser scan data
The location, type, and severity of external defects on hardwood logs and stems are the primary indicators of overall log quality and value. External defects provide hints about t...
Liya Thomas, Lamine Mili, Clifford A. Shaffer, Ed ...
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 9 months ago
Efficiently Answering Probabilistic Threshold Top-k Queries on Uncertain Data
on Uncertain Data (Extended Abstract) Ming Hua Jian Pei Wenjie Zhang Xuemin Lin Simon Fraser University, Canada The University of New South Wales & NICTA {mhua, jpei}@cs.sfu.c...
Ming Hua, Jian Pei, Wenjie Zhang, Xuemin Lin
KDD
2005
ACM
73views Data Mining» more  KDD 2005»
14 years 8 months ago
Using relational knowledge discovery to prevent securities fraud
We describe an application of relational knowledge discovery to a key regulatory mission of the National Association of Securities Dealers (NASD). NASD is the world's largest...
Özgür Simsek, David Jensen, Henry G. Gol...
CADE
2008
Springer
14 years 8 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen