Sciweavers

528 search results - page 98 / 106
» The Similarity Join Database Operator
Sort
View
83
Voted
ICDAR
2009
IEEE
15 years 4 months ago
ICDAR 2009 Handwritten Farsi/Arabic Character Recognition Competition
In recent years, the recognition of Farsi and Arabic handwriting is drawing increasing attention. This paper describes the result of the ICDAR 2009 competition for handwritten Far...
Saeed Mozaffari, Hadi Soltanizadeh
84
Voted
AIPR
2008
IEEE
15 years 4 months ago
Temporal structure methods for image-based change analysis
– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Ray Rimey, Dan Keefe
70
Voted
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 4 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
93
Voted
ICIP
2007
IEEE
15 years 4 months ago
Rotation-Independent IRIS Matching by Motion Estimation
In this paper we propose a novel method of applying motion estimation techniques to human authentication by iris matching. By exploiting the inherent differences in vector fields ...
Donald M. Monro, Soumyadip Rakshit
SAS
2004
Springer
15 years 3 months ago
Generalized Records and Spatial Conjunction in Role Logic
Role logic is a notation for describing properties of relational structures in shape analysis, databases and knowledge bases. A natural fragment of role logic corresponds to two-va...
Viktor Kuncak, Martin C. Rinard