Sciweavers

901 search results - page 117 / 181
» On Anonymization of String Data
Sort
View
CVPR
2011
IEEE
14 years 9 months ago
Enforcing Similarity Constraints with Integer Programming for Better Scene Text Recognition
The recognition of text in everyday scenes is made difficult by viewing conditions, unusual fonts, and lack of linguistic context. Most methods integrate a priori appearance info...
David Smith, Jacqueline Feild, Eric Learned-Miller
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 5 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
ICDAR
2011
IEEE
14 years 1 months ago
HMM-Based Alignment of Inaccurate Transcriptions for Historical Documents
—For historical documents, available transcriptions typically are inaccurate when compared with the scanned document images. Not only the position of the words and sentences are ...
Andreas Fischer, Emanuel Indermühle, Volkmar ...
IPPS
2007
IEEE
15 years 7 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
GPCE
2007
Springer
15 years 7 months ago
Simple and safe SQL queries with c++ templates
Most software applications use a relational database for data management and storage. Interaction with such a database is often done by letting the program construct strings with ...
Joseph Gil, Keren Lenz