Sciweavers

1030 search results - page 187 / 206
» The ENZYME database in 2000
Sort
View
MVA
2007
196views Computer Vision» more  MVA 2007»
13 years 11 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
AAAI
2000
13 years 11 months ago
Memory-Based Forecasting for Weather Image Patterns
A novel method and a framework called Memory-Based Forecasting are proposed to forecast complex and timevarying natural patterns with the goal of supporting experts' decision...
Kazuhiro Otsuka, Tsutomu Horikoshi, Satoshi Suzuki...
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 11 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
DELOS
2000
13 years 11 months ago
Analysis of the Effectiveness-Efficiency Dependence for Image Retrieval
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
Martin Heczko, Daniel A. Keim, Roger Weber
DOA
2000
116views more  DOA 2000»
13 years 11 months ago
Jini Technology Applied to Railway Systems
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...
Txomin Nieva, Andreas Fabri, Abdenbi Benammour