Sciweavers

2386 search results - page 253 / 478
» Database Security 2000
Sort
View
CCS
2007
ACM
15 years 5 months ago
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
We present Asirra (Figure 1), a CAPTCHA that asks users to identify cats out of a set of 12 photographs of both cats and dogs. Asirra is easy for users; user studies indicate it c...
Jeremy Elson, John R. Douceur, Jon Howell, Jared S...
SACMAT
2010
ACM
15 years 3 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 2 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
85
Voted
ICCV
2009
IEEE
16 years 4 months ago
A Riemannian Analysis of 3D Nose Shapes For Partial Human Biometrics
In this paper we explore the use of shapes of noses for performing partial human biometrics. The basic idea is to represent nasal surfaces using indexed collections of isocurves,...
Hassen drira, Boulbaba Ben Amor, Anuj Srivastava, ...
SIGMOD
2001
ACM
229views Database» more  SIGMOD 2001»
15 years 11 months ago
A Robust, Optimization-Based Approach for Approximate Answering of Aggregate Queries
The ability to approximately answer aggregation queries accurately and efficiently is of great benefit for decision support and data mining tools. In contrast to previous sampling...
Surajit Chaudhuri, Gautam Das, Vivek R. Narasayya