Sciweavers

3377 search results - page 144 / 676
» Describing differences between databases
Sort
View
134
Voted
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
15 years 1 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
163
Voted
CORR
2011
Springer
204views Education» more  CORR 2011»
14 years 7 months ago
Face Recognition using 3D Facial Shape and Color Map Information: Comparison and Combination
In this paper, we investigate the use of 3D surface geometry for face recognition and compare it to one based on color map information. The 3D surface and color map data are from ...
Afzal Godil, Sandy Ressler, Patrick Grother
138
Voted
ICTAI
2010
IEEE
15 years 1 months ago
Discountings of a Belief Function Using a Confusion Matrix
In this paper, we present an analysis of different approaches relative to the correction of belief functions based on the results given by a confusion matrix. Three different mecha...
Zied Elouedi, Eric Lefevre, David Mercier
DEXA
1998
Springer
105views Database» more  DEXA 1998»
15 years 7 months ago
Semantic Based Schema Analysis
: Semantic similarity between schema elements is greatly influenced by the context in which the elements are defined and compared. This paper emphasizes on the role of context in e...
Nayyer Masood, Barry Eaglestone
ER
1993
Springer
163views Database» more  ER 1993»
15 years 7 months ago
Using Conceptual Graph Theory to Support Schema Integration
Two major problems in schema integration are to identify correspondences between different conceptual schemas and to verify that the proposed correspondences are consistent with th...
Paul Johannesson