Sciweavers

3361 search results - page 20 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
ICDE
2002
IEEE
204views Database» more  ICDE 2002»
15 years 10 months ago
Approximating a Data Stream for Querying and Estimation: Algorithms and Performance Evaluation
Obtaining fast and good quality approximations to data distributions is a problem of central interest to database management. A variety of popular database applications including,...
Sudipto Guha, Nick Koudas
VLDB
2007
ACM
161views Database» more  VLDB 2007»
15 years 9 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
ICIP
2002
IEEE
15 years 11 months ago
Multimedia content authentication: fundamental limits
In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a m...
Emin Martinian, Gregory W. Wornell
ICIP
2002
IEEE
15 years 11 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson
91
Voted
PAMI
2007
121views more  PAMI 2007»
14 years 9 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...