Sciweavers

1732 search results - page 333 / 347
» Sequences of Level 1, 2, 3, ..., k , ..
Sort
View
ICPR
2004
IEEE
15 years 10 months ago
Face Authentication Test on the BANCA Database
This paper details the results of a Face Authentication Test (FAT2004) [2] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held ...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
95
Voted
IJNSEC
2007
110views more  IJNSEC 2007»
14 years 9 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
15 years 4 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer
WWW
2006
ACM
15 years 10 months ago
CWS: a comparative web search system
In this paper, we define and study a novel search problem: Comparative Web Search (CWS). The task of CWS is to seek relevant and comparative information from the Web to help users...
Jian-Tao Sun, Xuanhui Wang, Dou Shen, Hua-Jun Zeng...
WWW
2005
ACM
15 years 10 months ago
Expressiveness of XSDs: from practice to theory, there and back again
On an abstract level, XML Schema increases the limited expressive power of Document Type Definitions (DTDs) by extending them with a recursive typing mechanism. However, an invest...
Geert Jan Bex, Wim Martens, Frank Neven, Thomas Sc...