Abstract. We propose a method to exponentially speed up computation of var-ious fingerprints, such as the ones used to compute similarity and rarity in mas-sive data sets. Rather then maintaining the full stream of b items of a universe [u], such methods only maintain a concise fingerprint of the stream, and perform computations using the fingerprints. The computations are done approximately, and the required fingerprint size k depends on the desired accuracy and con-fidence δ. Our technique maintains a single bit per hash function, rather than a single integer, thus requiring a fingerprint of length k = O ( l
The fingerprint biometric is often used as the primary source of person authentication in a large po...
Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are ...
Leakage of a document distributed among a set of authorized recipients may result in violation of co...
In many large chemoinformatics database systems, molecules are represented by long bi-nary fingerpri...
Due to the quick increase in digital data, especially in mobile usage and social media, data dedupli...
We aim to speed up approximate keyword matching with the use of a lightweight, fixed-size block of d...
In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. T...
The work deals with the resistance of the VeriFinger comparison algorithm to synthetic fingerprints....
This paper proposes a new hash-based indexing method to speed up fingerprint identification in large...
We study the problem of clustering fingerprints with at most p missing values (CMV(p) for short) nat...
Pattern matching and analysis over network data streams is increasingly becoming an essential primit...
Significant efforts are continuously being made in designing new fingerprint recognition algorithms ...
In order to fulfill the potential of fingerprint templates as the basis for authentication schemes, ...
Abstract. This paper proposes a new fingerprint matching algorithm for locally deformed fingerprints...
AbstractWe study the problem of clustering fingerprints with at most p missing values (CMV(p) for sh...
The fingerprint biometric is often used as the primary source of person authentication in a large po...
Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are ...
Leakage of a document distributed among a set of authorized recipients may result in violation of co...
In many large chemoinformatics database systems, molecules are represented by long bi-nary fingerpri...
Due to the quick increase in digital data, especially in mobile usage and social media, data dedupli...
We aim to speed up approximate keyword matching with the use of a lightweight, fixed-size block of d...
In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. T...
The work deals with the resistance of the VeriFinger comparison algorithm to synthetic fingerprints....
This paper proposes a new hash-based indexing method to speed up fingerprint identification in large...
We study the problem of clustering fingerprints with at most p missing values (CMV(p) for short) nat...
Pattern matching and analysis over network data streams is increasingly becoming an essential primit...
Significant efforts are continuously being made in designing new fingerprint recognition algorithms ...
In order to fulfill the potential of fingerprint templates as the basis for authentication schemes, ...
Abstract. This paper proposes a new fingerprint matching algorithm for locally deformed fingerprints...
AbstractWe study the problem of clustering fingerprints with at most p missing values (CMV(p) for sh...
The fingerprint biometric is often used as the primary source of person authentication in a large po...
Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are ...
Leakage of a document distributed among a set of authorized recipients may result in violation of co...