Sciweavers

7811 search results - page 1347 / 1563
» computing 2004
Sort
View
126
Voted
ICAI
2004
15 years 5 months ago
Use of Histogram Distances in Iris Authentication
Quantitatively establishing the discriminative power of iris biometric data is considered. Multi-level 2D wavelet transform has been widely used for iris verification system. Whil...
Seung-Seok Choi, Sungsoo Yoon, Sung-Hyuk Cha, Char...
149
Voted
ICAI
2004
15 years 5 months ago
A Comparison of Resampling Methods for Clustering Ensembles
-- Combination of multiple clusterings is an important task in the area of unsupervised learning. Inspired by the success of supervised bagging algorithms, we propose a resampling ...
Behrouz Minaei-Bidgoli, Alexander P. Topchy, Willi...
136
Voted
ICINCO
2004
102views Robotics» more  ICINCO 2004»
15 years 5 months ago
Toward Machines with Emotional Intelligence
For half a century, artificial intelligence researchers have focused on giving machines linguistic and mathematical-logical reasoning abilities, modeled after the classic linguist...
Rosalind W. Picard
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 5 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
129
Voted
ICMLA
2004
15 years 5 months ago
LASSO: a learning architecture for semantic web ontologies
Expressing web page content in a way that computers can understand is the key to a semantic web. Generating ontological information from the web automatically using machine learni...
Christopher N. Hammack, Stephen D. Scott
« Prev « First page 1347 / 1563 Last » Next »