Sciweavers

2386 search results - page 352 / 478
» Database Security 2000
Sort
View
PR
2010
141views more  PR 2010»
14 years 4 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
TSMC
2010
14 years 4 months ago
Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition
Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the ...
Emanuele Maiorana, Patrizio Campisi, Julian Fi&eac...
POST
2012
218views more  POST 2012»
13 years 5 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
ICIP
2004
IEEE
15 years 11 months ago
A novel progressive thick slab paradigm for volumetric medical image compression and navigation
In this paper, we propose a novel thick slab paradigm which provides an efficient scheme to navigate through large three dimensional (3-D) medical data sets within the framework o...
S. V. Bharath Kumar, Sudipta Mukhopadhyay, Vishram...
KYOTODL
2000
87views more  KYOTODL 2000»
14 years 11 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...