Sciweavers

535 search results - page 104 / 107
» Concurrency Control: Methods, Performance, and Analysis
Sort
View
ICASSP
2010
IEEE
13 years 8 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
IPSN
2011
Springer
12 years 11 months ago
Localising speech, footsteps and other sounds using resource-constrained devices
While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and works...
Yukang Guo, Mike Hazas
MICCAI
2009
Springer
14 years 9 months ago
MKL for Robust Multi-modality AD Classification
We study the problem of classifying mild Alzheimer's disease (AD) subjects from healthy individuals (controls) using multi-modal image data, to facilitate early identification...
Chris Hinrichs, Vikas Singh, Guofan Xu, Sterlin...
ICML
1999
IEEE
14 years 8 months ago
Distributed Value Functions
Many interesting problems, such as power grids, network switches, and tra c ow, that are candidates for solving with reinforcement learningRL, alsohave properties that make distri...
Jeff G. Schneider, Weng-Keen Wong, Andrew W. Moore...
WWW
2008
ACM
14 years 8 months ago
Personalized web exploration with task models
Personalized Web search has emerged as one of the hottest topics for both the Web industry and academic researchers. However, the majority of studies on personalized search focuse...
Jae-wook Ahn, Peter Brusilovsky, Daqing He, Jonath...