Sciweavers

112 search results - page 22 / 23
» Integrating Face Recognition into Security Systems
Sort
View
POPL
2000
ACM
15 years 2 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
DASFAA
2007
IEEE
208views Database» more  DASFAA 2007»
15 years 4 months ago
Probabilistic Nearest-Neighbor Query on Uncertain Objects
Nearest-neighbor queries are an important query type for commonly used feature databases. In many different application areas, e.g. sensor databases, location based services or fac...
Hans-Peter Kriegel, Peter Kunath, Matthias Renz
DASFAA
2006
IEEE
183views Database» more  DASFAA 2006»
15 years 3 months ago
Probabilistic Similarity Join on Uncertain Data
An important database primitive for commonly used feature databases is the similarity join. It combines two datasets based on some similarity predicate into one set such that the n...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
DSN
2009
IEEE
14 years 7 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
ACCV
2007
Springer
15 years 4 months ago
Comparative Studies on Multispectral Palm Image Fusion for Biometrics
Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi...
Ying Hao, Zhenan Sun, Tieniu Tan