Sciweavers

123 search results - page 14 / 25
» Domain Consistency with Forbidden Values
Sort
View
EUROCRYPT
2006
Springer
14 years 1 months ago
Hiding Secret Points Amidst Chaff
Motivated by the representation of biometric and multimedia objects, we consider the problem of hiding noisy point-sets using a secure sketch. A point-set X consists of s points fr...
Ee-Chien Chang, Qiming Li
PR
2008
113views more  PR 2008»
13 years 9 months ago
Heart sound as a biometric
In this paper, we investigate the possibility of using heart sound as a biometric for human identification. The most significant contribution of using heart sound as a biometric is...
Koksoon Phua, Jianfeng Chen, Tran Huy Dat, Louis S...
KDD
2004
ACM
139views Data Mining» more  KDD 2004»
14 years 10 months ago
Machine learning for online query relaxation
In this paper we provide a fast, data-driven solution to the failing query problem: given a query that returns an empty answer, how can one relax the query's constraints so t...
Ion Muslea
ICALP
2007
Springer
14 years 4 months ago
Universal Algebra and Hardness Results for Constraint Satisfaction Problems
We present algebraic conditions on constraint languages Γ that ensure the hardness of the constraint satisfaction problem CSP(Γ) for complexity classes L, NL, P, NP and ModpL. Th...
Benoit Larose, Pascal Tesson
IJAR
2002
102views more  IJAR 2002»
13 years 9 months ago
Networks of probabilistic events in discrete time
The usual methods of applying Bayesian networks to the modeling of temporal processes, such as Dean and Kanazawa's dynamic Bayesian networks (DBNs), consist in discretizing t...
Severino F. Galán, Francisco Javier D&iacut...