Sciweavers

897 search results - page 117 / 180
» promise 2010
Sort
View
118
Voted
PR
2010
220views more  PR 2010»
14 years 11 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
PR
2010
147views more  PR 2010»
14 years 11 months ago
Minimum classification error learning for sequential data in the wavelet domain
Wavelet analysis has found widespread use in signal processing and many classification tasks. Nevertheless, its use in dynamic pattern recognition have been much more restricted ...
D. Tomassi, Diego H. Milone, L. Forzani
177
Voted
PRICAI
2010
Springer
14 years 11 months ago
Multi-manifold Clustering
Manifold clustering, which regards clusters as groups of points around compact manifolds, has been realized as a promising generalization of traditional clustering. A number of lin...
Yong Wang, Yuan Jiang, Yi Wu, Zhi-Hua Zhou
85
Voted
PVLDB
2010
95views more  PVLDB 2010»
14 years 11 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
RAID
2010
Springer
14 years 11 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...