Sciweavers

66 search results - page 5 / 14
» An Access Control System with Time-constraint Using Support ...
Sort
View
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
13 years 10 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
FAST
2009
13 years 3 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
MLDM
2005
Springer
13 years 11 months ago
An Automatic Face Recognition System in the Near Infrared Spectrum
Face recognition is a challenging visual classification task, especially when the lighting conditions can not be controlled. In this paper, we present an automatic face recognitio...
Shuyan Zhao, Rolf-Rainer Grigat
ICASSP
2008
IEEE
14 years 6 days ago
System combination using auxiliary information for speaker verification
Recent studies in speaker recognition have shown that scorelevel combination of subsystems can yield significant performance gains over individual subsystems. We explore the use ...
Luciana Ferrer, Martin Graciarena, Argyrios Zymnis...
IROS
2006
IEEE
126views Robotics» more  IROS 2006»
13 years 11 months ago
A System for Robotic Heart Surgery that Learns to Tie Knots Using Recurrent Neural Networks
Abstract— Tying suture knots is a time-consuming task performed frequently during Minimally Invasive Surgery (MIS). Automating this task could greatly reduce total surgery time f...
Hermann Georg Mayer, Faustino J. Gomez, Daan Wiers...