Sciweavers

3836 search results - page 579 / 768
» Semantics of Database Transformations
Sort
View
WACV
2002
IEEE
15 years 9 months ago
Fingerprint Verification Using Genetic Algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
139
Voted
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 8 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
15 years 8 months ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
MICCAI
2001
Springer
15 years 8 months ago
Retrospective Evaluation of Inter-subject Brain Registration
Although numerous methods to register brains of different individuals have been proposed, no work has been done, as far as we know, to evaluate and compare objectively the performa...
Pierre Hellier, Christian Barillot, Isabelle Corou...
SSDBM
2010
IEEE
112views Database» more  SSDBM 2010»
15 years 8 months ago
BEMC: A Searchable, Compressed Representation for Large Seismic Wavefields
Abstract. State-of-the-art numerical solvers in Earth Sciences produce multi terabyte datasets per execution. Operating on increasingly larger datasets becomes challenging due to i...
Julio López, Leonardo Ramírez-Guzm&a...