Sciweavers

347 search results - page 67 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
GCB
2007
Springer
91views Biometrics» more  GCB 2007»
15 years 4 months ago
Integrative Analysis of Transcriptome and Metabolome Data
Biological systems have to react to environmental and/or developmental changes by adjusting their biochemical/cellular machinery on numerous levels. In many cases small molecules ...
Lothar Willmitzer, Camila Caldana, Alisdair R. Fer...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
AVSS
2009
IEEE
15 years 4 months ago
Event Composition with Imperfect Information for Bus Surveillance
—Demand for bus surveillance is growing due to the increased threats of terrorist attack, vandalism and litigation. However, CCTV systems are traditionally used in forensic mode,...
Jianbing Ma, Weiru Liu, Paul Miller, Weiqi Yan
ISMIR
2005
Springer
165views Music» more  ISMIR 2005»
15 years 3 months ago
Using a Pitch Detector for Onset Detection
A segmentation strategy is explored for monophonic instrumental pitched non-percussive material (PNP) which proceeds from the assertion that human-like event analysis can be found...
Nick Collins
TROB
2002
120views more  TROB 2002»
14 years 9 months ago
DPAC: an object-oriented distributed and parallel computing framework for manufacturing applications
Parallel and distributed computing infrastructure are increasingly being embraced in the context of manufacturing applications, including real-time scheduling. In this paper, we pr...
N. R. Srinivasa Raghavan, Tanmay Waghmare