Sciweavers

1830 search results - page 167 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICAPR
2005
Springer
14 years 4 months ago
Symmetric Hash Functions for Fingerprint Minutiae
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
Sergey Tulyakov, Faisal Farooq, Venu Govindaraju
ISWC
2002
IEEE
14 years 3 months ago
Wearable Sensing to Annotate Meeting Recordings
We propose to use wearable computers and sensor systems to generate personal contextual annotations in audio visual recordings of meetings. In this paper we argue that such annota...
Nicky Kern, Gerhard Tröster, Bernt Schiele, H...
DEXAW
2009
IEEE
73views Database» more  DEXAW 2009»
14 years 2 months ago
Matching Semantic Web Resources
—In this paper, we propose knowledge-chunk based techniques for instance matching and mapping discovery of Semantic Web resources. Knowledge chunks provide a synthetic representa...
Silvana Castano, Alfio Ferrara, Stefano Montanelli...
AI
2005
Springer
14 years 22 days ago
Incorporating Evidence in Bayesian Networks with the Select Operator
Abstract. In this paper, we propose that the select operator in relational databases be adopted for incorporating evidence in Bayesian networks. This approach does not involve the ...
Cory J. Butz, F. Fang
NAACL
2004
14 years 4 days ago
Answering Definition Questions Using Multiple Knowledge Sources
Definition questions represent a largely unexplored area of question answering--they are different from factoid questions in that the goal is to return as many relevant "nugg...
Wesley Hildebrandt, Boris Katz, Jimmy J. Lin