Sciweavers

3836 search results - page 550 / 768
» Semantics of Database Transformations
Sort
View
ICDM
2006
IEEE
114views Data Mining» more  ICDM 2006»
15 years 10 months ago
Incremental Mining of Frequent Query Patterns from XML Queries for Caching
Existing studies for mining frequent XML query patterns mainly introduce a straightforward candidate generate-and-test strategy and compute frequencies of candidate query patterns...
Guoliang Li, Jianhua Feng, Jianyong Wang, Yong Zha...
JOC
2007
93views more  JOC 2007»
15 years 4 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
TIFS
2010
173views more  TIFS 2010»
15 years 2 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
ICPR
2002
IEEE
16 years 5 months ago
Relationship between Identification Metrics: Expected Confusion and Area Under a ROC Curve
The mathematical relationship between the expectedconfusion metric and the area under a receiver operating characteristic (ROC) curve is derived. Given a limited database of subje...
Amos Y. Johnson, Aaron F. Bobick
ICPR
2002
IEEE
16 years 5 months ago
Incorporating Conditional Independence Assumption with Support Vector Machines to Enhance Handwritten Character Segmentation Per
Learning Bayesian Belief Networks (BBN) from corpora and incorporating the extracted inferring knowledge with a Support Vector Machines (SVM) classifier has been applied to charac...
Manolis Maragoudakis, Ergina Kavallieratou, Nikos ...