Sciweavers

3836 search results - page 564 / 768
» Semantics of Database Transformations
Sort
View
144
Voted
ICDT
2010
ACM
172views Database» more  ICDT 2010»
15 years 9 months ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang
SIBGRAPI
2000
IEEE
15 years 8 months ago
Brazilian Bank Check Handwritten Legal Amount Recognition
This paper presents a system that is being developed for the recognition of the handwritten legal amount in Brazilian bank checks. Our strategy used to approach the handwritten leg...
Cinthia Obladen de Almendra Freitas, Abdenaim El Y...
140
Voted
ASWEC
2004
IEEE
15 years 7 months ago
UML Documentation Support for XML Schema
With the proliferation of XML as the lingua franca of internet information exchange, engineering XML documents and maintaining their databases becomes a major challenge. In this c...
Flora Dilys Salim, Rosanne Price, Shonali Krishnas...
PKDD
2000
Springer
120views Data Mining» more  PKDD 2000»
15 years 7 months ago
Multi-Relational Data Mining, Using UML for ILP
Although there is a growing need for multi-relational data mining solutions in KDD, the use of obvious candidates from the field of Inductive Logic Programming (ILP) has been limit...
Arno J. Knobbe, Arno Siebes, Hendrik Blockeel, Dan...
163
Voted
AVBPA
2005
Springer
225views Biometrics» more  AVBPA 2005»
15 years 6 months ago
Video-Based Face Recognition Using Bayesian Inference Model
There has been a flurry of works on video sequence-based face recognition in recent years. One of the hard problems in this area is how to effectively combine the facial configu...
Wei Fan, Yunhong Wang, Tieniu Tan