Sciweavers

28962 search results - page 5770 / 5793
» Computational Mechanism Design
Sort
View
PAMI
2007
127views more  PAMI 2007»
13 years 7 months ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker
PVLDB
2008
141views more  PVLDB 2008»
13 years 7 months ago
WebTables: exploring the power of tables on the web
The World-Wide Web consists of a huge number of unstructured documents, but it also contains structured data in the form of HTML tables. We extracted 14.1 billion HTML tables from...
Michael J. Cafarella, Alon Y. Halevy, Daisy Zhe Wa...
QRE
2008
140views more  QRE 2008»
13 years 7 months ago
Discrete mixtures of kernels for Kriging-based optimization
: Kriging-based exploration strategies often rely on a single Ordinary Kriging model which parametric covariance kernel is selected a priori or on the basis of an initial data set....
David Ginsbourger, Céline Helbert, Laurent ...
SCFBM
2008
138views more  SCFBM 2008»
13 years 6 months ago
Epigrass: a tool to study disease spread in complex networks
Background: The construction of complex spatial simulation models such as those used in network epidemiology, is a daunting task due to the large amount of data involved in their ...
Flávio C. Coelho, Oswaldo G. Cruz, Cl&aacut...
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 6 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
« Prev « First page 5770 / 5793 Last » Next »