Sciweavers

3361 search results - page 21 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal
FAST
2009
14 years 7 months ago
Dynamic Resource Allocation for Database Servers Running on Virtual Storage
We introduce a novel multi-resource allocator to dynamically allocate resources for database servers running on virtual storage. Multi-resource allocation involves proportioning t...
Gokul Soundararajan, Daniel Lupei, Saeed Ghanbari,...
IMCIM
1995
15 years 1 months ago
Evaluation of Object-Oriented Database Systems
Despite the fact that object-oriented database systems (OODBS) have gained potential as promising database technology for non-standard applications such as computer integrated manu...
Christian Huemer, Gerti Kappel, S. Rausch-Schott, ...
IEEEARES
2006
IEEE
15 years 3 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl
ECBS
2007
IEEE
111views Hardware» more  ECBS 2007»
15 years 3 months ago
Model-Based Empirical Performance Evaluation Based on Relational Traces
Empirical performance evaluation is the process of measuring and calculating performance metrics of deployed software systems. It is a part of performance validation during testin...
Marko Boskovic