Sciweavers

11328 search results - page 2079 / 2266
» Timed Branching Processes
Sort
View
ICDM
2010
IEEE
199views Data Mining» more  ICDM 2010»
15 years 1 months ago
Addressing Concept-Evolution in Concept-Drifting Data Streams
Abstract--The problem of data stream classification is challenging because of many practical aspects associated with efficient processing and temporal behavior of the stream. Two s...
Mohammad M. Masud, Qing Chen, Latifur Khan, Charu ...
125
Voted
ICIP
2010
IEEE
15 years 1 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
137
Voted
ICIP
2010
IEEE
15 years 1 months ago
People identification using shadow dynamics
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/gait biometrics are the most important tools for this task....
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
111
Voted
ICIP
2010
IEEE
15 years 1 months ago
Resolving distortion between linear and area sensors for forensic print inspection
: Resolving distortion between linear and area sensors for forensic print inspection Stephen B. Pollard, Guy B. Adams, Steven J. Simske HP Laboratories HPL-2010-172 Security print...
Stephen B. Pollard, Guy B. Adams, Steven J. Simske
118
Voted
INLG
2010
Springer
15 years 1 months ago
JU_CSE_GREC10: Named Entity Generation at GREC 2010
This paper presents the experiments carried out at Jadavpur University as part of the participation in the GREC Named Entity Generation Challenge 2010. The Baseline system is base...
Amitava Das, Tanik Saikh, Tapabrata Mondal, Sivaji...
« Prev « First page 2079 / 2266 Last » Next »