Sciweavers

4408 search results - page 874 / 882
» Developing Web Applications from Conceptual Models
Sort
View
TIFS
2010
307views more  TIFS 2010»
14 years 8 months ago
Face matching and retrieval using soft biometrics
—Soft biometric traits embedded in a face (e.g., gender and facial marks) are ancillary information and are not fully distinctive by themselves in face-recognition tasks. However...
Unsang Park, Anil K. Jain
INFOCOM
2011
IEEE
14 years 1 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
MSWIM
2009
ACM
15 years 4 months ago
Directional neighbor discovery in 60 GHz indoor wireless networks
The unlicensed 60 GHz band brings the promise of multi-gigabit data rates to support new applications such as high definition video over wireless links. Signal propagation in the...
Jianxia Ning, Tae-Suk Kim, Srikanth V. Krishnamurt...
ISI
2008
Springer
14 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
PLDI
2005
ACM
15 years 3 months ago
Pin: building customized program analysis tools with dynamic instrumentation
Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance evaluation, and bug detection. To meet this need, we ha...
Chi-Keung Luk, Robert S. Cohn, Robert Muth, Harish...