Sciweavers

775 search results - page 132 / 155
» Consistency and Performance of Concurrent Interactive Databa...
Sort
View
DSOM
2005
Springer
15 years 3 months ago
SLA Design from a Business Perspective
Abstract. A method is proposed whereby values for Service Level Objectives (SLOs) of an SLA can be chosen to reduce the sum IT infrastructure cost plus business financial loss. Bu...
Jacques Philippe Sauvé, Filipe Marques, Ant...
MVA
2007
196views Computer Vision» more  MVA 2007»
14 years 11 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
SOCO
2008
Springer
14 years 9 months ago
A face recognition system based on Pseudo 2D HMM applied to neural network coefficients
Face recognition from an image or video sequences is emerging as an active research area with numerous commercial and law enforcement applications. In this paper different Pseudo 2...
Vitoantonio Bevilacqua, Lucia Cariello, Gaetano Ca...
SIBGRAPI
2005
IEEE
15 years 3 months ago
Ridge-Based Fingerprint Matching Using Hough Transform
Despite the efficacy of minutia-based fingerprint matching techniques for good-quality images captured by optical sensors, minutia-based techniques do not often perform so well on...
Aparecido Nilceu Marana, Anil K. Jain
MDM
2010
Springer
180views Communications» more  MDM 2010»
15 years 2 months ago
Online Time Interval Top-k Queries in Wireless Sensor Networks
Motivated by many applications, top-k query is a fundamental operation in modern database systems. Technological advances have enabled the deployment of large-scale sensor networks...
Baichen Chen, Weifa Liang, Jeffrey Xu Yu