Sciweavers

16513 search results - page 3024 / 3303
» Numerical Analysis Methods
Sort
View
PRL
2007
180views more  PRL 2007»
15 years 4 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
QUESTA
2007
50views more  QUESTA 2007»
15 years 4 months ago
Stability of join-the-shortest-queue networks
This paper investigates stability behavior in a variant of a generalized Jackson queueing network. In our network, some customers use a join-the-shortest-queue policy when enterin...
J. G. Dai, John J. Hasenbein, Bara Kim
PVLDB
2008
144views more  PVLDB 2008»
15 years 4 months ago
Mining search engine query logs via suggestion sampling
Many search engines and other web applications suggest auto-completions as the user types in a query. The suggestions are generated from hidden underlying databases, such as query...
Ziv Bar-Yossef, Maxim Gurevich
SAC
2008
ACM
15 years 4 months ago
Pattern ranking for semi-automatic ontology construction
When developing semantic applications, the construction of ontologies is a crucial part. We are developing a semiautomatic ontology construction approach, OntoCase, relying on ont...
Eva Blomqvist
CVPR
2009
IEEE
1148views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Shape Constrained Figure-Ground Segmentation and Tracking
Global shape information is an effective top-down complement to bottom-up figure-ground segmentation as well as a useful constraint to avoid drift during adaptive tracking. We p...
Zhaozheng Yin, Robert T. Collins
« Prev « First page 3024 / 3303 Last » Next »