Sciweavers

9223 search results - page 1744 / 1845
» Privacy-preserving performance measurements
Sort
View
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 7 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
125
Voted
GRID
2005
Springer
15 years 7 months ago
Toward seamless grid data access: design and implementation of GridFTP on .NET
— To date, only Linux-/UNIX-based hosts have been participants in the Grid vision for seamless data access, because the necessary Grid data access protocols have not been impleme...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
ICAPR
2005
Springer
15 years 7 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...
ICMI
2005
Springer
429views Biometrics» more  ICMI 2005»
15 years 7 months ago
A first evaluation study of a database of kinetic facial expressions (DaFEx)
In this paper we present DaFEx (Database of Facial Expressions), a database created with the purpose of providing a benchmark for the evaluation of the facial expressivity of Embo...
Alberto Battocchi, Fabio Pianesi, Dina Goren-Bar
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
15 years 7 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
« Prev « First page 1744 / 1845 Last » Next »