Sciweavers

1937 search results - page 236 / 388
» Conditioning Probabilistic Databases
Sort
View
ICASSP
2008
IEEE
15 years 9 months ago
On the optimality of ideal binary time-frequency masks
Recently the concept of ideal binary time-frequency masks has received attention and their optimality in terms of signalto-noise ratio has been presumed. However the optimality is...
Yipeng Li, DeLiang Wang
148
Voted
ADC
2008
Springer
110views Database» more  ADC 2008»
15 years 9 months ago
Graph Mining based on a Data Partitioning Approach
Existing graph mining algorithms typically assume that the dataset can fit into main memory. As many large graph datasets cannot satisfy this condition, truly scalable graph minin...
Son N. Nguyen, Maria E. Orlowska, Xue Li
113
Voted
DEXAW
2007
IEEE
118views Database» more  DEXAW 2007»
15 years 9 months ago
Author Identification Using Imbalanced and Limited Training Texts
This paper deals with the problem of author identification. The Common N-Grams (CNG) method [6] is a language-independent profile-based approach with good results in many author i...
Efstathios Stamatatos
93
Voted
ICASSP
2007
IEEE
15 years 9 months ago
The Biosecure Geometry-Based System for Hand Modality
We present an identification and authentication system based on hand modality which is part of a reference system for all modalities developed within the Biosecure consortium. It...
Geoffroy Fouquier, Laurence Likforman-Sulem, J&eac...
102
Voted
ICDE
2006
IEEE
152views Database» more  ICDE 2006»
15 years 8 months ago
Redundancy Awareness in SQL Queries
In this paper, we study SQL queries with aggregate subqueries that share common tables and conditions with the outer query. While several approaches can deal with such queries, th...
Bin Cao, Antonio Badia