Sciweavers

727 search results - page 23 / 146
» Making Distortions Comprehensible
Sort
View
JIDM
2010
122views more  JIDM 2010»
13 years 6 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane
22
Voted
AIED
2009
Springer
14 years 2 months ago
Generating Instruction Automatically for the Reading Strategy of Self-Questioning
Self-questioning is an important reading comprehension strategy, so it would be useful for an intelligent tutor to help students apply it to any given text. Our goal is to help chi...
Jack Mostow, Wei Chen
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
14 years 1 months ago
Embeddable Overlay Networks
—The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from Triangle Inequality Violations (TIVs). A novel approach - Embeddable Overlay...
Eng Keong Lua, Timothy G. Griffin
IPCV
2008
13 years 9 months ago
Minutiae-Based Fingerprint Matching
Abstract--We propose a new minutiae-based approach to match fingerprint images using similar structures. Distortion poses serious threats through altered geometry, increases false ...
Neeta Nain, B. M. Deepak, Dinesh Kumar, Biju Gauth...
KIVS
2005
Springer
14 years 1 months ago
A Comparison of WS-BusinessActivity and BPEL4WS Long-Running Transaction
Although WS-BusinessActivity and BPEL4WS Long-Running Transaction (LRT) are conceptually very similar and are both designed to support the execution of complex business transaction...
Patrick Sauter, Ingo Melzer