Sciweavers

2956 search results - page 481 / 592
» Databases and Higher Types
Sort
View
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
CIKM
2005
Springer
15 years 3 months ago
Semantic similarity over the gene ontology: family correlation and selecting disjunctive ancestors
Many bioinformatics applications would benefit from comparing proteins based on their biological role rather than their sequence. In most biological databases, proteins are alrea...
Francisco M. Couto, Mário J. Silva, Pedro C...
MM
2004
ACM
149views Multimedia» more  MM 2004»
15 years 3 months ago
An adaptive skin model and its application to objectionable image filtering
We propose an adaptive skin-detection method, which allows modelling and detection of the true skin-color pixels with significantly higher accuracy and flexibility than previous...
Qiang Zhu, Ching-Tung Wu, Kwang-Ting Cheng, Yi-Leh...
AMFG
2003
IEEE
152views Biometrics» more  AMFG 2003»
15 years 3 months ago
Fully Automatic Upper Facial Action Recognition
This paper provides a new fully automatic framework to analyze facial action units, the fundamental building blocks of facial expression enumerated in Paul Ekman’s Facial Action...
Ashish Kapoor, Yuan (Alan) Qi, Rosalind W. Picard
WWW
2009
ACM
15 years 2 months ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...