Sciweavers

2386 search results - page 449 / 478
» Database Security 2000
Sort
View
KYOTODL
2000
122views more  KYOTODL 2000»
13 years 11 months ago
Federation Services for Heterogeneous Digital Libraries Accessing Cooperative and Non-Cooperative Sources
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
Martin Endig, Michael Höding, Gunter Saake, K...
JHSN
2000
390views more  JHSN 2000»
13 years 9 months ago
Telemedicine: challenges and opportunities
Telemedicine is many things to many people. Only until a few years ago, telemedicine was equated to video teleconferencing between physicians, while nowadays, perhaps the most acti...
Sang-goo Lee, Seong K. Mun, Prakash Jha, Betty Ann...
PR
2000
102views more  PR 2000»
13 years 9 months ago
Bayesian face recognition
We propose a new technique for direct visual matching of images for the purposes of face recognition and image retrieval, using a probabilistic measure of similarity, based primar...
Baback Moghaddam, Tony Jebara, Alex Pentland
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 10 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin