Sciweavers

529 search results - page 90 / 106
» Indexing Biometric Databases Using Pyramid Technique
Sort
View
CIKM
2004
Springer
14 years 1 months ago
Discovering frequently changing structures from historical structural deltas of unordered XML
Recently, a large amount of work has been done in XML data mining. However, we observed that most of the existing works focus on the snapshot XML data, while XML data is dynamic i...
Qiankun Zhao, Sourav S. Bhowmick, Mukesh K. Mohani...
CIKM
1999
Springer
14 years 23 days ago
A Method of Geographical Name Extraction from Japanese Text for Thematic Geographical Search
A text retrieval method called the thematic geographical search method has been developed and applied to a Japanese encyclopedia called the World Encyclopædia. In this method, th...
Yasusi Kanada
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
11 years 11 months ago
Differentially Private Spatial Decompositions
— Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and ...
Graham Cormode, Cecilia M. Procopiuc, Divesh Sriva...
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
14 years 10 days ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...