Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Abstract. Multimedia presentations and their applications are becoming more and more popular in most spheres of industry and everyday life. A database approach could help in queryi...
Zhiyong Huang, Binjia Jiao, B. Prabhakaran, Conrad...
This paper introduces an invoice analysis approach using CaseBased Reasoning (CBR). CBR is used to analyze and interpret new invoices thanks to the previous processing experiences...
We present in this paper a supervised approach for automatic detection of micro-calcifications. The system is based on learning the different morphology of the micro-calcification...
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport surveillance systems using mugshot databases to screen tr...