Sciweavers

1035 search results - page 169 / 207
» Cluster validation using information stability measures
Sort
View
81
Voted
DCOSS
2009
Springer
14 years 7 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
ICPR
2008
IEEE
15 years 11 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
WWW
2004
ACM
15 years 10 months ago
Small world peer networks in distributed web search
In ongoing research, a collaborative peer network application is being proposed to address the scalability limitations of centralized search engines. Here we introduce a local ada...
Ruj Akavipat, Le-Shin Wu, Filippo Menczer
INFOVIS
2000
IEEE
15 years 2 months ago
Visualizing Sequential Patterns for Text Mining
A sequential pattern in data mining is a finite series of elements such as A → B → C → D where A, B, C, and D are elements of the same domain. The mining of sequential patte...
Pak Chung Wong, Wendy Cowley, Harlan Foote, Elizab...
IJIRR
2011
135views more  IJIRR 2011»
14 years 4 months ago
Query Recommendation for Improving Search Engine Results
— recently, search engines become more critical for finding information over the World Wide Web where web content growing fast, the user's satisfaction of search engine resu...
Hamada M. Zahera, Gamal F. El-Hady, W. F. Abd El-W...