Sciweavers

2386 search results - page 441 / 478
» Database Security 2000
Sort
View
TES
2000
Springer
14 years 1 months ago
Active Rules for XML: A New Paradigm for E-Services
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
Angela Bonifati, Stefano Ceri, Stefano Paraboschi
MVA
2007
196views Computer Vision» more  MVA 2007»
13 years 11 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
AAAI
2000
13 years 11 months ago
Memory-Based Forecasting for Weather Image Patterns
A novel method and a framework called Memory-Based Forecasting are proposed to forecast complex and timevarying natural patterns with the goal of supporting experts' decision...
Kazuhiro Otsuka, Tsutomu Horikoshi, Satoshi Suzuki...
DELOS
2000
13 years 11 months ago
Analysis of the Effectiveness-Efficiency Dependence for Image Retrieval
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
Martin Heczko, Daniel A. Keim, Roger Weber
DOA
2000
116views more  DOA 2000»
13 years 11 months ago
Jini Technology Applied to Railway Systems
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...
Txomin Nieva, Andreas Fabri, Abdenbi Benammour