Sciweavers

256 search results - page 32 / 52
» Externalized Fingerprint Matching
Sort
View
KCAP
2009
ACM
14 years 2 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...
ICPR
2006
IEEE
14 years 8 months ago
Quality-based Score Level Fusion in Multibiometric Systems
The quality of biometric samples has a significant impact on the accuracy of a matcher. Poor quality biometric samples often lead to incorrect matching results because the feature...
Anil K. Jain, Karthik Nandakumar, Sarat C. Dass, Y...
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 29 days ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
14 years 8 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...
ACSAC
2004
IEEE
13 years 11 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh