Sciweavers

2386 search results - page 277 / 478
» Database Security 2000
Sort
View
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
15 years 1 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 5 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
ICPR
2002
IEEE
16 years 4 months ago
FVC2002: Second Fingerprint Verification Competition
Two years after the first edition, a new Fingerprint Verification Competition (FVC2002) was organized by the authors, with the aim of determining the state-of-theart in this chall...
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jam...
ANLP
1997
81views more  ANLP 1997»
15 years 4 months ago
Name pronunciation in German text-to-speech synthesis
We describe the name analysis and pronunciation component in the German version of the Bell Labs multilingual text-tospeech system. We concentrate on street names because they enc...
Stefanie Jannedy, Bernd Möbius
KYOTODL
2000
140views more  KYOTODL 2000»
15 years 4 months ago
Text Data Mining: Discovery of Important Keywords in the Cyberspace
This paper describes applications of the optimized pattern discover),framework to text and Webmining. In particular; we introduce a class of simple combinatorialpatterns over phra...
Hiroki Arimura, Jun-ichiro Abe, Hiroshi Sakamoto, ...