Sciweavers

12183 search results - page 2359 / 2437
» Computers under Attacks!
Sort
View
EDBT
2009
ACM
156views Database» more  EDBT 2009»
15 years 3 months ago
Efficient skyline retrieval with arbitrary similarity measures
A skyline query returns a set of objects that are not dominated by other objects. An object is said to dominate another if it is closer to the query than the latter on all factors...
Deepak P, Prasad M. Deshpande, Debapriyo Majumdar,...
ICB
2007
Springer
183views Biometrics» more  ICB 2007»
15 years 3 months ago
Robust Point-Based Feature Fingerprint Segmentation Algorithm
Abstract. A critical step in automatic fingerprint recognition is the accurate segmentation of fingerprint images. The objective of fingerprint segmentation is to decide which part...
Chaohong Wu, Sergey Tulyakov, Venu Govindaraju
AI50
2006
15 years 3 months ago
The iCub  Cognitive Humanoid Robot: An Open-System Research Platform for Enactive Cognition
Abstract. This paper describes a multi-disciplinary initiative to promote collaborative research in enactive artificial cognitive systems by developing the iCub : a open-systems 53...
Giulio Sandini, Giorgio Metta, David Vernon
ATVA
2006
Springer
102views Hardware» more  ATVA 2006»
15 years 3 months ago
A Semantic Framework for Test Coverage
Abstract. Since testing is inherently incomplete, test selection is of vital importance. Coverage measures evaluate the quality of a test suite and help the tester select test case...
Laura Brandán Briones, Ed Brinksma, Mari&eu...
CCS
2006
ACM
15 years 3 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
« Prev « First page 2359 / 2437 Last » Next »