Sciweavers

72 search results - page 14 / 15
» A recursive system identification method based on binary mea...
Sort
View
MEDIAFORENSICS
2010
14 years 11 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
WWW
2009
ACM
15 years 4 months ago
Threshold selection for web-page classification with highly skewed class distribution
We propose a novel cost-efficient approach to threshold selection for binary web-page classification problems with imbalanced class distributions. In many binary-classification ta...
Xiaofeng He, Lei Duan, Yiping Zhou, Byron Dom
ANCS
2005
ACM
15 years 3 months ago
Framework for supporting multi-service edge packet processing on network processors
Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-servic...
Arun Raghunath, Aaron R. Kunze, Erik J. Johnson, V...
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
15 years 2 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
MM
2009
ACM
245views Multimedia» more  MM 2009»
15 years 4 months ago
Concept detectors: how good is good enough?
Today, semantic concept based video retrieval systems often show insufficient performance for real-life applications. Clearly, a big share of the reason is the lacking performance...
Robin Aly, Djoerd Hiemstra