Sciweavers

889 search results - page 171 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
JIIS
2007
133views more  JIIS 2007»
14 years 9 months ago
SPHINX: Schema integration by example
The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repositories ...
François Barbançon, Daniel P. Mirank...
JASIS
2000
120views more  JASIS 2000»
14 years 9 months ago
Probabilistic datalog: Implementing logical information retrieval for advanced applications
In the logical approach to information retrieval (IR), retrieval is considered as uncertain inference. Whereas classical IR models are based on propositional logic, we combine Dat...
Norbert Fuhr
ICPR
2004
IEEE
15 years 10 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
BMCBI
2010
113views more  BMCBI 2010»
14 years 9 months ago
Use of historic metabolic biotransformation data as a means of anticipating metabolic sites using MetaPrint2D and Bioclipse
Background: Predicting metabolic sites is important in the drug discovery process to aid in rapid compound optimisation. No interactive tool exists and most of the useful tools ar...
Lars Carlsson, Ola Spjuth, Samuel Adams, Robert C....
KDD
2006
ACM
109views Data Mining» more  KDD 2006»
15 years 10 months ago
Extracting redundancy-aware top-k patterns
Observed in many applications, there is a potential need of extracting a small set of frequent patterns having not only high significance but also low redundancy. The significance...
Dong Xin, Hong Cheng, Xifeng Yan, Jiawei Han