Sciweavers

1056 search results - page 68 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 3 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
IDEAL
2005
Springer
14 years 3 months ago
Weighted SOM-Face: Selecting Local Features for Recognition from Individual Face Image
Abstract. In human face recognition, different facial regions have different degrees of importance, and exploiting such information would hopefully improve the accuracy of the reco...
Xiaoyang Tan, Jun Liu, Songcan Chen, Fuyan Zhang
ISMIR
2005
Springer
137views Music» more  ISMIR 2005»
14 years 3 months ago
Extracting Quality Parameters for Compressed Audio from Fingerprints
An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of audio content. It can be used to identify audio, even when of severely dist...
Peter Jan O. Doets, Reginald L. Lagendijk
ECAI
2004
Springer
14 years 3 months ago
Postponing Branching Decisions
Abstract. Solution techniques for Constraint Satisfaction and Optimisation Problems often make use of backtrack search methods, exploiting variable and value ordering heuristics. I...
Willem Jan van Hoeve, Michela Milano
GRID
2004
Springer
14 years 3 months ago
A Web based Conversational Case-Based Recommender System for Ontology aided Metadata Discovery
Locating resources of interest in a large resourceintensive environment is a challenging problem. In this paper we present research on addressing this problem through the developm...
Mehmet S. Aktas, Marlon E. Pierce, Geoffrey Fox, D...