Sciweavers

2458 search results - page 382 / 492
» Database-Management Principles And Applications
Sort
View
ICDS
2010
IEEE
15 years 4 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
CHI
2010
ACM
15 years 4 months ago
iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces
When asked to draw, many people are hesitant because they consider themselves unable to draw well. This paper describes the first system for a computer to provide direction and fe...
Daniel Dixon, Manoj Prasad, Tracy Hammond
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
15 years 4 months ago
Join Optimization of Information Extraction Output: Quality Matters!
— Information extraction (IE) systems are trained to extract specific relations from text databases. Real-world applications often require that the output of multiple IE systems...
Alpa Jain, Panagiotis G. Ipeirotis, AnHai Doan, Lu...
ICDE
2009
IEEE
118views Database» more  ICDE 2009»
15 years 4 months ago
An Incremental Threshold Method for Continuous Text Search Queries
Abstract—A text filtering system monitors a stream of incoming documents, to identify those that match the interest profiles of its users. The user interests are registered at ...
Kyriakos Mouratidis, HweeHwa Pang
SAC
2009
ACM
15 years 4 months ago
Parameterless outlier detection in data streams
Outlyingness is a subjective concept relying on the isolation level of a (set of) record(s). Clustering-based outlier detection is a field that aims to cluster data and to detect...
Alice Marascu, Florent Masseglia