Sciweavers

2463 search results - page 266 / 493
» Compressing Pattern Databases
Sort
View
ICVGIP
2008
15 years 7 days ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi
IPCV
2008
15 years 7 days ago
Robust Hough-Based Symbol Recognition Using Knowledge-Based Hierarchical Neural Networks
Abstract - A robust method for symbol recognition is presented that utilizes a compact signature based on a modified Hough Transform (HT) and knowledge-based hierarchical neural ne...
Alexander Wong, William Bishop
83
Voted
FIMI
2004
172views Data Mining» more  FIMI 2004»
15 years 6 days ago
AIM2: Improved implementation of AIM
We present AIM2-F, an improved implementation of AIM-F [4] algorithm for mining frequent itemsets. Past studies have proposed various algorithms and techniques for improving the e...
Sagi Shporer
MSV
2004
15 years 5 days ago
S(b)-Trees: An Optimal Balancing of Variable Length Keys
The paper studies the problem of maintaining external dynamic dictionaries with variable length keys. We introduce a new type of balanced trees, called S(b)-trees, which generaliz...
Konstantin V. Shvachko
FIMI
2003
120views Data Mining» more  FIMI 2003»
15 years 5 days ago
MAFIA: A Performance Study of Mining Maximal Frequent Itemsets
We present a performance study of the MAFIA algorithm for mining maximal frequent itemsets from a transactional database. In a thorough experimental analysis, we isolate the effec...
Douglas Burdick, Manuel Calimlim, Jason Flannick, ...