In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
In order to be economically feasible and to offer high levels of availability and performance, large scale distributed systems depend on the automation of repair services. While t...
This paper describes a two-stage system for the recognition of postage meter values. A feed-forward Neural Abstraction Pyramid is initialized in an unsupervised manner and trained...
We discuss query evaluation for XML-based server systems where the same query is evaluated on every incoming XML message. In a typical scenario, many of the incoming messages will...
This paper introduces COLT (Continuous On-Line Tuning), a novel framework that continuously monitors the workload of a database system and enriches the existing physical design wi...
Karl Schnaitter, Serge Abiteboul, Tova Milo, Neokl...