Sciweavers

1335 search results - page 227 / 267
» Privacy in Database Publishing
Sort
View
BMVC
2010
14 years 10 months ago
Toward Robust Action Retrieval in Video
Retrieving human actions from video databases is a paramount but challenging task in computer vision. In this work, we develop such a framework for robustly recognizing human acti...
Samy Bakheet, Ayoub Al-Hamadi, Bernd Michaelis, Us...
ICDAR
2009
IEEE
14 years 9 months ago
Offline Signature Verification Based on Pseudo-Cepstral Coefficients
Features representing information about pressure distribution from a static image of a handwritten signature are analyzed for an offline verification system. From gray-scale image...
Jesus Francisco Vargas Bonilla, Miguel Angel Ferre...
JAMIA
2010
79views more  JAMIA 2010»
14 years 6 months ago
A systematic literature review of automated clinical coding and classification systems
Clinical coding and classification processes transform natural language descriptions in clinical text into data that can subsequently be used for clinical care, research, and othe...
Mary H. Stanfill, Margaret Williams, Susan H. Fent...
CCS
2009
ACM
16 years 14 days ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
CCS
2007
ACM
15 years 6 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...