Sciweavers

910 search results - page 79 / 182
» Detecting False Matches in String Matching Algorithms
Sort
View
WCRE
1995
IEEE
15 years 6 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
15 years 9 months ago
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a...
Masashi Une, Akira Otsuka, Hideki Imai
CCS
1999
ACM
15 years 7 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speci...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
MM
2006
ACM
180views Multimedia» more  MM 2006»
15 years 9 months ago
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation
The identification of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Chong-Wah Ngo, Wanlei Zhao, Yu-Gang Jiang
CVPR
2009
IEEE
16 years 10 months ago
Physiological Face Recognition Is Coming of Age
The previous work of the authors has shown that physiological information on the face can be extracted from thermal infrared imagery and can be used as a biometric. Although, th...
Pradeep Buddharaju (University of Houston), Ioanni...