Sciweavers

121 search results - page 19 / 25
» Efficient algorithms for verifying memory consistency
Sort
View
PR
2010
220views more  PR 2010»
14 years 10 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
EDBT
2000
ACM
15 years 3 months ago
Mining Classification Rules from Datasets with Large Number of Many-Valued Attributes
Decision tree induction algorithms scale well to large datasets for their univariate and divide-and-conquer approach. However, they may fail in discovering effective knowledge when...
Giovanni Giuffrida, Wesley W. Chu, Dominique M. Ha...
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
15 years 12 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
CONSTRAINTS
2006
105views more  CONSTRAINTS 2006»
14 years 11 months ago
Symmetry Breaking Constraints for Value Symmetries in Constraint Satisfaction
Constraint satisfaction problems (CSPs) sometimes contain both variable symmetries and value symmetries, causing adverse effects on CSP solvers based on tree search. As a remedy, s...
Y. Law, J. Lee
BMCBI
2004
323views more  BMCBI 2004»
14 years 11 months ago
Biochemical Network Stochastic Simulator (BioNetS): software for stochastic modeling of biochemical networks
Background: Intrinsic fluctuations due to the stochastic nature of biochemical reactions can have large effects on the response of biochemical networks. This is particularly true ...
David Adalsteinsson, David McMillen, Timothy C. El...