Sciweavers

12453 search results - page 2466 / 2491
» Concurrent Data Structures
Sort
View
PAMI
2006
186views more  PAMI 2006»
13 years 10 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
QUESTA
2006
94views more  QUESTA 2006»
13 years 9 months ago
Modeling teletraffic arrivals by a Poisson cluster process
In this paper we consider a Poisson cluster process N as a generating process for the arrivals of packets to a server. This process generalizes in a more realistic way the infinite...
Gilles Faÿ, Bárbara González-Ar...
SIGMETRICS
2008
ACM
181views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Counter braids: a novel counter architecture for per-flow measurement
Fine-grained network measurement requires routers and switches to update large arrays of counters at very high link speed (e.g. 40 Gbps). A naive algorithm needs an infeasible amo...
Yi Lu, Andrea Montanari, Balaji Prabhakar, Sarang ...
IJSWIS
2007
171views more  IJSWIS 2007»
13 years 9 months ago
Experience in Aligning Anatomical Ontologies
An ontology is a formal representation of a domain modeling the entities in the domain and their relations. When a domain is represented by multiple ontologies, there is need for ...
Songmao Zhang, Olivier Bodenreider
IS
2007
13 years 9 months ago
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....
« Prev « First page 2466 / 2491 Last » Next »