Sciweavers

2421 search results - page 206 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
183
Voted
VLDB
1995
ACM
214views Database» more  VLDB 1995»
15 years 7 months ago
Dynamic Multi-Resource Load Balancing in Parallel Database Systems
Parallel database systems have to support the effective parallelization of complex queries in multi-user mode, i.e. in combination with inter-query/inter-transaction parallelism. ...
Erhard Rahm, Robert Marek
122
Voted
WSC
2008
15 years 6 months ago
A preliminary study of optimal splitting for rare-event simulation
Efficiency is a big concern when using simulation to estimate rare-event probabilities, since a huge number of simulation replications may be needed in order to obtain a reasonabl...
John F. Shortle, Chun-Hung Chen
146
Voted
PAMI
2012
13 years 6 months ago
Detachable Object Detection: Segmentation and Depth Ordering from Short-Baseline Video
—We describe an approach for segmenting a moving image into regions that correspond to surfaces in the scene that are partially surrounded by the medium. It integrates both appea...
Alper Ayvaci, Stefano Soatto
117
Voted
ICIP
2005
IEEE
16 years 5 months ago
Using visual features for anti-spam filtering
Unsolicited Commercial Email (UCE), also known as spam, has been a major problem on the Internet. In the past, researchers have addressed this problem as a text classification or ...
Ching-Tung Wu, Kwang-Ting Cheng, Qiang Zhu, Yi-Leh...
141
Voted
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer