Sciweavers

5344 search results - page 391 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICIP
2005
IEEE
16 years 6 months ago
Shape contexts and Gabor features for face description and authentication
In this paper, we use a robust shape matching algorithm for stablishing correspondences between points from face images, and Gabor vectors (jets) for feature computation. After ex...
Daniel González-Jiménez, José...
ICPR
2002
IEEE
16 years 6 months ago
Prototype Selection for Finding Efficient Representations of Dissimilarity Data
The nearest neighbor (NN) rule is a simple and intuitive method for solving classification problems. Originally, it uses distances to the complete training set. It performs well, ...
Elzbieta Pekalska, Robert P. W. Duin
KDD
2003
ACM
156views Data Mining» more  KDD 2003»
16 years 5 months ago
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
Defining outliers by their distance to neighboring examples is a popular approach to finding unusual examples in a data set. Recently, much work has been conducted with the goal o...
Stephen D. Bay, Mark Schwabacher
SIGMOD
2004
ACM
163views Database» more  SIGMOD 2004»
16 years 5 months ago
FleXPath: Flexible Structure and Full-Text Querying for XML
Querying XML data is a well-explored topic with powerful databasestyle query languages such as XPath and XQuery set to become W3C standards. An equally compelling paradigm for que...
Sihem Amer-Yahia, Laks V. S. Lakshmanan, Shashank ...
EDBT
2010
ACM
116views Database» more  EDBT 2010»
15 years 11 months ago
HARRA: fast iterative hashed record linkage for large-scale data collections
We study the performance issue of the “iterative” record linkage (RL) problem, where match and merge operations may occur together in iterations until convergence emerges. We ...
Hung-sik Kim, Dongwon Lee