Sciweavers

1513 search results - page 186 / 303
» Cryptographic Pattern Matching
Sort
View
EDBT
2008
ACM
159views Database» more  EDBT 2008»
14 years 10 months ago
Automaton in or out: run-time plan optimization for XML stream processing
Many systems such as Tukwila and YFilter combine automaton and algebra techniques to process queries over tokenized XML streams. Typically in this architecture, an automaton is fi...
Hong Su, Elke A. Rundensteiner, Murali Mani
EDBT
2009
ACM
123views Database» more  EDBT 2009»
14 years 5 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
ICPR
2008
IEEE
14 years 4 months ago
Generative models for fingerprint individuality using ridge models
Generative models of pattern individuality attempt to learn the distribution of observed quantitative features to determine the probability of two random patterns being the same. ...
Chang Su, Sargur N. Srihari
IEEEIAS
2007
IEEE
14 years 4 months ago
Generative Models for Fingerprint Individuality using Ridge Types
Generative models of pattern individuality attempt to represent the distribution of observed quantitative features, e.g., by learning parameters from a database, and then use such...
Gang Fang, Sargur N. Srihari, Harish Srinivasan
POLICY
2007
Springer
14 years 4 months ago
Specifying and Enforcing High-Level Semantic Obligation Policies
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems...
Zhen Liu, Anand Ranganathan, Anton Riabov