Sciweavers

7596 search results - page 304 / 1520
» Challenges in forensic computing
Sort
View
148
Voted
DSOM
2005
Springer
15 years 10 months ago
Towards Automated Deployment of Built-to-Order Systems
Abstract. End-to-end automated application design and deployment poses a significant technical challenge. With increasing scale and complexity of IT systems and the manual handling...
Akhil Sahai, Calton Pu, Gueyoung Jung, Qinyi Wu, W...
149
Voted
EMMCVPR
2005
Springer
15 years 10 months ago
Segmentation Informed by Manifold Learning
In many biomedical imaging applications, video sequences are captured with low resolution and low contrast challenging conditions in which to detect, segment, or track features. Wh...
Qilong Zhang, Richard Souvenir, Robert Pless
165
Voted
EPIA
2005
Springer
15 years 10 months ago
Robust Real-Time Human Activity Recognition from Tracked Face Displacements
We are interested in the challenging scientific pursuit of how to characterize human activities in any formal meeting situation by tracking people’s positions with a computer vi...
Paul E. Rybski, Manuela M. Veloso
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 10 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
108
Voted
ISI
2005
Springer
15 years 10 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...