Sciweavers

7431 search results - page 1479 / 1487
» Temporal Information Extraction
Sort
View
PR
2010
179views more  PR 2010»
14 years 8 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
SIGOPS
2010
162views more  SIGOPS 2010»
14 years 8 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
ACL
2010
14 years 7 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
ECCV
2010
Springer
14 years 7 months ago
Discriminative Nonorthogonal Binary Subspace Tracking
Visual tracking is one of the central problems in computer vision. A crucial problem of tracking is how to represent the object. Traditional appearance-based trackers are using inc...
Ang Li, Feng Tang, Yanwen Guo, Hai Tao
BICOB
2009
Springer
14 years 7 months ago
A Biclustering Method to Discover Co-regulated Genes Using Diverse Gene Expression Datasets
We propose a two-step biclustering approach to mine co-regulation patterns of a given reference gene to discover other genes that function in a common biological process. Currently...
Doruk Bozdag, Jeffrey D. Parvin, Ümit V. &Cce...
« Prev « First page 1479 / 1487 Last » Next »