Sciweavers

70 search results - page 8 / 14
» System-Level Verification - A Comparison of Approaches
Sort
View
BMCBI
2010
94views more  BMCBI 2010»
13 years 7 months ago
Comparison study of microarray meta-analysis methods
Background: Meta-analysis methods exist for combining multiple microarray datasets. However, there are a wide range of issues associated with microarray meta-analysis and a limite...
Anna Campain, Yee Hwa Yang
EDBT
2008
ACM
120views Database» more  EDBT 2008»
14 years 7 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...
ACHI
2009
IEEE
14 years 2 months ago
Ground Truth Verification Tool (GTVT) for Video Surveillance Systems
— As cameras and storage devices have become cheaper, the number of video surveillance systems has also increased. Video surveillance was (and mostly is) done by human operators ...
Amol Ambardekar, Mircea Nicolescu, Sergiu Dascalu
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Distance-Level Fusion Strategies for Online Signature Verification
In this paper an approach for combining online signature authentication experts will be proposed. The different experts are based on one feature extraction method presented in our...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
ICPR
2004
IEEE
14 years 8 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang