Sciweavers

155 search results - page 27 / 31
» From Data Independence to Knowledge Independence: An on-goin...
Sort
View
IJON
2006
72views more  IJON 2006»
13 years 7 months ago
Extraction of a source signal whose kurtosis value lies in a specific range
In many applications extraction of source signals of interest from observed signals maybe is a more feasible approach than simultaneous separation of all the source signals, since...
Zhi-Lin Zhang, Zhang Yi
TIFS
2008
123views more  TIFS 2008»
13 years 7 months ago
A Region Ensemble for 3-D Face Recognition
In this paper, we introduce a new system for 3-D face recognition based on the fusion of results from a committee of regions that have been independently matched. Experimental resu...
Timothy C. Faltemier, Kevin W. Bowyer, Patrick J. ...
PODS
2009
ACM
134views Database» more  PODS 2009»
14 years 8 months ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...
BTW
2009
Springer
132views Database» more  BTW 2009»
14 years 16 hour ago
A Bayesian Approach to Estimating the Selectivity of Conjunctive Predicates
: Cost-based optimizers in relational databases make use of data statistics to estimate intermediate result cardinalities. Those cardinalities are needed to estimate access plan co...
M. Heimel, Volker Markl, Keshava Murthy
ML
2010
ACM
163views Machine Learning» more  ML 2010»
13 years 2 months ago
Classification with guaranteed probability of error
We introduce a general-purpose learning machine that we call the Guaranteed Error Machine, or GEM, and two learning algorithms, a real GEM algorithm and an ideal GEM algorithm. Th...
Marco C. Campi