Sciweavers

14348 search results - page 2720 / 2870
» Active Database Systems
Sort
View
PAMI
2011
14 years 11 months ago
Latent Fingerprint Matching
Latent fingerprint identification is of critical importance in forensics. While tremendous progress has been made in the field of automatic fingerprint identification, latent...
Anil K. Jain, Jianjiang Feng
135
Voted
WWW
2011
ACM
14 years 11 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
150
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
162
Voted
SAC
2010
ACM
14 years 10 months ago
Convex onion peeling genetic algorithm: an efficient solution to map labeling of point-feature
Map labeling of point-feature is the problem of placing text labels to corresponding point features on a map in a way that minimizes overlaps while satisfying basic rules for the ...
Wan D. Bae, Shayma Alkobaisi, Petr Vojtechovsk&yac...
TASLP
2010
106views more  TASLP 2010»
14 years 10 months ago
Efficient and Robust Music Identification With Weighted Finite-State Transducers
We present an approach to music identification based on weighted finite-state transducers and Gaussian mixture models, inspired by techniques used in large-vocabulary speech recogn...
Mehryar Mohri, Pedro Moreno, Eugene Weinstein
« Prev « First page 2720 / 2870 Last » Next »