Sciweavers

2114 search results - page 365 / 423
» Performance Evaluation on a Real-Time Database
Sort
View
136
Voted
RECSYS
2009
ACM
15 years 10 months ago
Using a trust network to improve top-N recommendation
Top-N item recommendation is one of the important tasks of recommenders. Collaborative filtering is the most popular approach to building recommender systems which can predict ra...
Mohsen Jamali, Martin Ester
113
Voted
ICPR
2008
IEEE
15 years 10 months ago
Representative feature chain for single gallery image face recognition
Under the constraint of using only a single gallery image per person, this paper proposes a fast multi-class pattern classification approach to 2D face recognition robust to chan...
Shaokang Chen, Conrad Sanderson, Sai Sun, Brian C....
ICPR
2008
IEEE
15 years 10 months ago
Retinal vessel tree segmentation using a deformable contour model
This paper presents an improved version of our specific methodology to detect the vessel tree in retinal angiographies. The automatic analysis of retinal vessel tree facilitates ...
Lucia Espona, María J. Carreira, Manuel Fra...
ITNG
2008
IEEE
15 years 10 months ago
An Efficient Technique for Distance Computation in Road Networks
With recent advances in wireless communication and position technologies, it became possible to collect and record trajectories of moving objects. Thus, many services in road netw...
Xu Jianqiu, Victor Teixeira de Almeida, Qin Xiaoli...
105
Voted
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 10 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov