Sciweavers

1890 search results - page 313 / 378
» Querying Big Data by Accessing Small Data
Sort
View
WCE
2007
15 years 7 days ago
Modified Energy Efficient Cache Invalidation Algorithm in Mobile Environment
– Maintenance of the cache consistency is a complicated issue in the wireless mobile environment. Caching of frequently accessed data items on the node can reduce the bandwidth r...
S. Sankara Gomathi, S. Krishnamurthi
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
15 years 5 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
ICCD
2006
IEEE
97views Hardware» more  ICCD 2006»
15 years 8 months ago
Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection
Pointer bugs associated with dynamically-allocated objects resulting in out-of-bounds memory access are an important class of software bugs. Because such bugs cannot be detected e...
Jin-Yi Wang, Yen-Shiang Shue, T. N. Vijaykumar, Sa...
SISAP
2009
IEEE
149views Data Mining» more  SISAP 2009»
15 years 5 months ago
Combinatorial Framework for Similarity Search
—We present an overview of the combinatorial framework for similarity search. An algorithm is combinatorial if only direct comparisons between two pairwise similarity values are ...
Yury Lifshits
97
Voted
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
15 years 5 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...