Component-based software development needs to formalize a process of generation, evaluation and selection of Composite COTS-based Software Systems (CCSS), enabling software archit...
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
A video sequence of a head moving across a large pose angle contains much richer information than a single-view image, and hence has greater potential for identification purposes....
Shaun Canavan, Benjamin Johnson, Michael Reale, Yo...
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Research in the speaker recognition community has continued to address methods of mitigating variational nuisances. Telephone and auxiliary-microphone recorded speech emphasize th...
Douglas E. Sturim, William M. Campbell, Najim Deha...