Sciweavers

2192 search results - page 292 / 439
» Algorithms for Challenging Motif Problems
Sort
View
130
Voted
ICIP
2010
IEEE
15 years 1 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
167
Voted
CDC
2010
IEEE
160views Control Systems» more  CDC 2010»
14 years 10 months ago
Model-on-Demand predictive control for nonlinear hybrid systems with application to adaptive behavioral interventions
This paper presents a data-centric modeling and predictive control approach for nonlinear hybrid systems. System identification of hybrid systems represents a challenging problem b...
Naresh N. Nandola, Daniel E. Rivera
152
Voted
IHI
2012
197views Healthcare» more  IHI 2012»
13 years 11 months ago
A corpus of clinical narratives annotated with temporal information
Clinical reports often include descriptions of events in the patient’s medical history, as well as explicit or implicit temporal information about these events. We are working t...
Lucian Galescu, Nate Blaylock
137
Voted
WWW
2008
ACM
16 years 4 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani
132
Voted
ICDE
2010
IEEE
311views Database» more  ICDE 2010»
16 years 25 days ago
Detecting Inconsistencies in Distributed Data
— One of the central problems for data quality is inconsistency detection. Given a database D and a set Σ of dependencies as data quality rules, we want to identify tuples in D ...
Wenfei Fan, Floris Geerts, Shuai Ma, Heiko Mü...