Sciweavers

7961 search results - page 1214 / 1593
» Data Integration with Uncertainty
Sort
View
DICTA
2007
15 years 6 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ERSA
2007
177views Hardware» more  ERSA 2007»
15 years 6 months ago
Energy-Aware System Synthesis for Reconfigurable Chip Multiprocessors
- Even though state-of-the-art FPGAs present new opportunities in exploring low-cost high-performance architectures for floating-point scientific applications, they also pose serio...
Xiaofang Wang, Sotirios G. Ziavras, Jie Hu
SDM
2010
SIAM
158views Data Mining» more  SDM 2010»
15 years 6 months ago
On the Use of Combining Rules in Relational Probability Trees
A relational probability tree (RPT) is a type of decision tree that can be used for probabilistic classification of instances with a relational structure. Each leaf of an RPT cont...
Daan Fierens
SDM
2010
SIAM
165views Data Mining» more  SDM 2010»
15 years 6 months ago
Exact Passive-Aggressive Algorithm for Multiclass Classification Using Support Class
The Passive Aggressive framework [1] is a principled approach to online linear classification that advocates minimal weight updates i.e., the least required so that the current tr...
Shin Matsushima, Nobuyuki Shimizu, Kazuhiro Yoshid...
238
Voted
IIWAS
2008
15 years 6 months ago
Cross-domain information and service interoperability
The growing trends towards integrating legacy applications with new systems in a network-centric environment has introduced yet another level of complexity beyond those we witness...
Kamran Sartipi, Azin Dehmoobad
« Prev « First page 1214 / 1593 Last » Next »