Sciweavers

72 search results - page 14 / 15
» A recursive system identification method based on binary mea...
Sort
View
MEDIAFORENSICS
2010
13 years 6 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
WWW
2009
ACM
13 years 11 months ago
Threshold selection for web-page classification with highly skewed class distribution
We propose a novel cost-efficient approach to threshold selection for binary web-page classification problems with imbalanced class distributions. In many binary-classification ta...
Xiaofeng He, Lei Duan, Yiping Zhou, Byron Dom
ANCS
2005
ACM
13 years 10 months ago
Framework for supporting multi-service edge packet processing on network processors
Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-servic...
Arun Raghunath, Aaron R. Kunze, Erik J. Johnson, V...
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
13 years 10 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
MM
2009
ACM
245views Multimedia» more  MM 2009»
13 years 11 months ago
Concept detectors: how good is good enough?
Today, semantic concept based video retrieval systems often show insufficient performance for real-life applications. Clearly, a big share of the reason is the lacking performance...
Robin Aly, Djoerd Hiemstra