Sciweavers

8312 search results - page 1539 / 1663
» Performance data collection using a hybrid approach
Sort
View
MMSEC
2005
ACM
132views Multimedia» more  MMSEC 2005»
15 years 7 months ago
Resolution and quality scalable spread spectrum image watermarking
If digital watermarking is to adequately protect content in systems which provide both resolution and quality scalability, then the watermarking algorithms used must provide both ...
Angela Piper, Reihaneh Safavi-Naini, Alfred Mertin...
ICAPR
2005
Springer
15 years 7 months ago
3D Action Modeling and Reconstruction for 2D Human Body Tracking
In this paper we present a technique for predicting the 2D human body joints and limbs position in monocular image sequences, and reconstructing its corresponding 3D postures using...
Ignasi Rius, Daniel Rowe, Jordi Gonzàlez, F...
OTM
2005
Springer
15 years 7 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
NSPW
2004
ACM
15 years 7 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
97
Voted
DEXA
2004
Springer
103views Database» more  DEXA 2004»
15 years 7 months ago
Characterizing Database User's Access Patterns
Much work has been done on characterizing the workload of a database system. Previous studies focused on providing different types of statistical summaries, and modeling the run-ti...
Qingsong Yao, Aijun An
« Prev « First page 1539 / 1663 Last » Next »