Sciweavers

1737 search results - page 291 / 348
» Conceptual approaches for defining data, information, and kn...
Sort
View
DRM
2007
Springer
15 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
MIR
2006
ACM
141views Multimedia» more  MIR 2006»
15 years 4 months ago
Mining temporal patterns of movement for video content classification
Scalable approaches to video content classification are limited by an inability to automatically generate representations of events ode abstract temporal structure. This paper pre...
Michael Fleischman, Philip DeCamp, Deb Roy
112
Voted
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 3 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
BTW
2005
Springer
91views Database» more  BTW 2005»
15 years 3 months ago
Element Relationship: Exploiting Inline Markup for Better XML Retrieval
: With the increasing popularity of semi-structured documents (particularly in the form of XML) for knowledge management, it is important to create tools that use the additional in...
Philipp Dopichaj
BMCBI
2006
120views more  BMCBI 2006»
14 years 10 months ago
An improved distance measure between the expression profiles linking co-expression and co-regulation in mouse
Background: Many statistical algorithms combine microarray expression data and genome sequence data to identify transcription factor binding motifs in the low eukaryotic genomes. ...
Ryung S. Kim, Hongkai Ji, Wing Hung Wong