Detecting database records that are approximate duplicates, but not exact duplicates, is an important task. Databases may contain duplicate records concerning the same real-world ...
Abstract. As an ongoing effort to develop a computer aided system for the detection of masses on mammograms, we propose on this work a new model-based segmentation algorithm. The a...
Fingerprints are widely used in automatic identity verification systems. The core of such systems is the verification algorithm to match two fingerprints. So far, various method fo...
Given a string s, the Parikh vector of s, denoted p(s), counts the multiplicity of each character in s. Searching for a match of Parikh vector q (a “jumbled string”) in the tex...
Peter Burcsi, Ferdinando Cicalese, Gabriele Fici, ...
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...