Sciweavers

1534 search results - page 169 / 307
» Error Reporting Logic
Sort
View
VLDB
2005
ACM
125views Database» more  VLDB 2005»
15 years 9 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
MCS
2004
Springer
15 years 9 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
ICDAR
2003
IEEE
15 years 9 months ago
Lexical Post-Processing Optimization for Handwritten Word Recognition
This paper presents a lexical post-processing optimization for handwritten word recognition. The aim of this work is to explore the combination of different lexical postprocessing...
Sabine Carbonnel, Éric Anquetil
INFOCOM
2003
IEEE
15 years 9 months ago
Big-Bang Simulation for embedding network distances in Euclidean space
— Embedding of a graph metric in Euclidean space efficiently and accurately is an important problem in general with applications in topology aggregation, closest mirror selectio...
Yuval Shavitt, Tomer Tankel
IPPS
2003
IEEE
15 years 9 months ago
Model Checking a Cache Coherence Protocol for a Java DSM Implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java’s memory model and allows multithreaded Java progr...
Jun Pang, Wan Fokkink, Rutger F. H. Hofman, Ronald...