Sciweavers

1247 search results - page 187 / 250
» Performance Analysis of Peer-to-Peer Networks for File Distr...
Sort
View
JEI
2008
109views more  JEI 2008»
13 years 6 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
WWW
2006
ACM
14 years 9 months ago
Compressing and searching XML data via two zips
XML is fast becoming the standard format to store, exchange and publish over the web, and is getting embedded in applications. Two challenges in handling XML are its size (the XML...
Paolo Ferragina, Fabrizio Luccio, Giovanni Manzini...
ICS
2009
Tsinghua U.
14 years 3 months ago
QuakeTM: parallelizing a complex sequential application using transactional memory
“Is transactional memory useful?” is the question that cannot be answered until we provide substantial applications that can evaluate its capabilities. While existing TM appli...
Vladimir Gajinov, Ferad Zyulkyarov, Osman S. Unsal...
CAIP
2009
Springer
114views Image Analysis» more  CAIP 2009»
13 years 11 months ago
Decision Trees Using the Minimum Entropy-of-Error Principle
Binary decision trees based on univariate splits have traditionally employed so-called impurity functions as a means of searching for the best node splits. Such functions use estim...
Joaquim Marques de Sá, João Gama, Ra...
IPTPS
2003
Springer
14 years 1 months ago
On the Feasibility of Peer-to-Peer Web Indexing and Search
This paper discusses the feasibility of peer-to-peer full-text keyword search of the Web. Two classes of keyword search techniques are in use or have been proposed: flooding of q...
Jinyang Li, Boon Thau Loo, Joseph M. Hellerstein, ...