Sciweavers

6104 search results - page 320 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
ICIP
2002
IEEE
16 years 6 months ago
Fingerprint matching based on error propagation
Fingerprint matching is one of the most important modules in automatic fingerprint identification systems (AFIS). Traditional methods treat this problem as point pattern matching,...
Ying Hao, Tieniu Tan, Yunhong Wang
ICDCS
1999
IEEE
15 years 9 months ago
On Providing Quality-of-Service Control for Core-Based Multicast Routing
In this paper, we develop e cient admission control tests for member join leave and its associated state refresh and update procedures for receiver-initiated core-based multicast ...
Hung-Ying Tyan, Chao-Ju Hou, Bin Wang 0002
ADC
2003
Springer
115views Database» more  ADC 2003»
15 years 8 months ago
Document Classification via Structure Synopses
Information available in the Internet is frequently supplied simply as plain ascii text, structured according to orthographic and semantic conventions. Traditional document classi...
Liping Ma, John Shepherd, Anh Nguyen
SIGIR
2004
ACM
15 years 10 months ago
Polynomial filtering in latent semantic indexing for information retrieval
Latent Semantic Indexing (LSI) is a well established and effective framework for conceptual information retrieval. In traditional implementations of LSI the semantic structure of...
Effrosini Kokiopoulou, Yousef Saad
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 11 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin