Sciweavers

1768 search results - page 345 / 354
» Mining Very Large Databases
Sort
View
PAA
2010
13 years 4 months ago
A comparative study on feature extraction for fingerprint classification and performance improvements using rank-level fusion
Abstract Fingerprint classification represents an important preprocessing step in fingerprint identification, which can be very helpful in reducing the cost of searching large fing...
Uday Rajanna, Ali Erol, George Bebis
GIS
2007
ACM
14 years 11 months ago
Evacuation route planning: scalable heuristics
Given a transportation network, a vulnerable population, and a set of destinations, evacuation route planning identifies routes to minimize the time to evacuate the vulnerable pop...
Sangho Kim, Betsy George, Shashi Shekhar
MM
2006
ACM
218views Multimedia» more  MM 2006»
14 years 3 months ago
SmartLabel: an object labeling tool using iterated harmonic energy minimization
Labeling objects in images is an essential prerequisite for many visual learning and recognition applications that depend on training data, such as image retrieval, object detecti...
Wen Wu, Jie Yang
CCS
2005
ACM
14 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
ICPP
2003
IEEE
14 years 3 months ago
Towards Grid Based Intelligent Information Systems
Multi agent systems, Grid technology, Semantic Web, and Web Intelligence paradigm are three modern approaches in information technologies, which we put together in our research eff...
A. Min Tjoa, Peter Brezany, Ivan Janciak