Sciweavers

10979 search results - page 2062 / 2196
» Visual information extraction
Sort
View
131
Voted
ASIACRYPT
2006
Springer
15 years 7 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
124
Voted
COOPIS
2004
IEEE
15 years 7 months ago
Automatic Initiation of an Ontology
We report on an a set of experiments carried out in the context of the Flemish OntoBasis project. Our purpose is to extract semantic relations from text corpora in an unsupervised ...
Marie-Laure Reinberger, Peter Spyns, A. Johannes P...
128
Voted
CIKM
2006
Springer
15 years 7 months ago
3DString: a feature string kernel for 3D object classification on voxelized data
Classification of 3D objects remains an important task in many areas of data management such as engineering, medicine or biology. As a common preprocessing step in current approac...
Johannes Aßfalg, Karsten M. Borgwardt, Hans-...
131
Voted
CPM
2000
Springer
141views Combinatorics» more  CPM 2000»
15 years 7 months ago
A Lower Bound for the Breakpoint Phylogeny Problem
Breakpoint phylogenies methods have been shown to be an effective way to extract phylogenetic information from gene order data. Currently, the only practical breakpoint phylogeny a...
David Bryant
143
Voted
FAST
2010
15 years 6 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
« Prev « First page 2062 / 2196 Last » Next »