Sciweavers

571 search results - page 47 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
ACISP
2005
Springer
15 years 8 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
121
Voted
IMC
2007
ACM
15 years 4 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
152
Voted
DEXA
2006
Springer
197views Database» more  DEXA 2006»
15 years 4 months ago
Cleaning Web Pages for Effective Web Content Mining
Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit webpage organization applications (e.g., keyword-bas...
Jing Li, Christie I. Ezeife
128
Voted
VCIP
2003
146views Communications» more  VCIP 2003»
15 years 4 months ago
A segmentation system with model-assisted completion of video objects
This paper presents a new algorithm for video-object segmentation, which combines motion-based segmentation, high-level object-model detection, and spatial segmentation into a sin...
Dirk Farin, Peter H. N. de With, Wolfgang Effelsbe...
108
Voted
MICCAI
1999
Springer
15 years 7 months ago
Detection of Pulmonary Nodules on Ct and Volumetric Assessment of Change over Time
Abstract. We present a computer vision system that automatically detects pulmonary nodules in computed tomography (CT) scans of oncology patients, performs size analysis and assess...
Margrit Betke, Jane P. Ko