Sciweavers

570 search results - page 38 / 114
» Using Patterns in the Design of Inter-organizational Systems...
Sort
View
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
14 years 1 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng
MCS
2004
Springer
14 years 2 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
ICIP
2005
IEEE
14 years 10 months ago
Comparative study: face recognition on unspecific persons using linear subspace methods
Recently many Automatic Face Recognition (AFR) systems were developed for applications with unspecific persons, which is different from conventional pattern recognition problems wh...
Dahua Lin, Shuicheng Yan, Xiaoou Tang
ICPADS
2002
IEEE
14 years 1 months ago
Communication Pattern Based Methodology for Performance Analysis of Termination Detection Schemes
Efficient determination of processing termination at barrier synchronization points can occupy an important role in the overall throughput of parallel and distributed computing sy...
Yili Tseng, Ronald F. DeMara
DGO
2003
140views Education» more  DGO 2003»
13 years 10 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...