Sciweavers

34170 search results - page 6568 / 6834
» Optimization
Sort
View
USS
2008
15 years 6 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
WSC
2007
15 years 6 months ago
A model for contact center analysis and simulation
In this paper we depart from a set of simple assumptions regarding the behavior of a pool of customers associated with an enterprise’s contact center. We assume that the pool of...
Juan M. Huerta
USS
2008
15 years 6 months ago
On Auditing Elections When Precincts Have Different Sizes
We address the problem of auditing an election when precincts may have different sizes. Prior work in this field has emphasized the simpler case when all precincts have the same s...
Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest
ACIVS
2008
Springer
15 years 6 months ago
Motion Recovery for Uncalibrated Turntable Sequences Using Silhouettes and a Single Point
Abstract. This paper addresses the problem of self-calibration and motion recovery for turntable sequences. Previous works exploited silhouette correspondences induced by epipolar ...
Hui Zhang, Ling Shao, Kwan-Yee Kenneth Wong
ECCV
2010
Springer
15 years 6 months ago
Emotion Recognition from Arbitrary View Facial Images
Abstract. Emotion recognition from facial images is a very active research topic in human computer interaction (HCI). However, most of the previous approaches only focus on the fro...
« Prev « First page 6568 / 6834 Last » Next »