Sciweavers

1861 search results - page 169 / 373
» 1.6-Bit Pattern Databases
Sort
View
133
Voted
ICAPR
2005
Springer
15 years 8 months ago
Symmetric Hash Functions for Fingerprint Minutiae
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
Sergey Tulyakov, Faisal Farooq, Venu Govindaraju
CINQ
2004
Springer
138views Database» more  CINQ 2004»
15 years 8 months ago
Relevancy in Constraint-Based Subgroup Discovery
This chapter investigates subgroup discovery as a task of constraint-based mining of local patterns, aimed at describing groups of individuals with unusual distributional character...
Nada Lavrac, Dragan Gamberger
124
Voted
ADBIS
2003
Springer
108views Database» more  ADBIS 2003»
15 years 7 months ago
Evaluation of Common Counting Method for Concurrent Data Mining Queries
Data mining queries are often submitted concurrently to the data mining system. The data mining system should take advantage of overlapping of the mined datasets. In this paper we ...
Marek Wojciechowski, Maciej Zakrzewicz
110
Voted
DEXAW
2004
IEEE
130views Database» more  DEXAW 2004»
15 years 6 months ago
Data Extraction from Web Data Sources
This paper provides an explanation of the basic data structures used in a new page analysis technique to create wrappers (data extractors) for the result pages produced by web sit...
Jerome Robinson
138
Voted
VLDB
1991
ACM
132views Database» more  VLDB 1991»
15 years 6 months ago
Fido: A Cache That Learns to Fetch
This paper describesFido, a predictive cache [Palmer 19901that prefetchesby employing an associativememoryto recognizeaccesspatterns within a context over time. Repeatedtraining a...
Mark Palmer, Stanley B. Zdonik