Sciweavers

797 search results - page 126 / 160
» XML version detection
Sort
View
ICPR
2010
IEEE
15 years 5 months ago
Dynamic Amelioration of Resolution Mismatches for Local Feature Based Identity Inference
While existing face recognition systems based on local features are robust to issues such as misalignment, they can exhibit accuracy degradation when comparing images of differing...
Yongkang Wong, Conrad Sanderson, Sandra Mau, Brian...
CSB
2005
IEEE
115views Bioinformatics» more  CSB 2005»
15 years 5 months ago
A New Clustering Strategy with Stochastic Merging and Removing Based on Kernel Functions
With hierarchical clustering methods, divisions or fusions, once made, are irrevocable. As a result, when two elements in a bottom-up algorithm are assigned to one cluster, they c...
Huimin Geng, Hesham H. Ali
DSN
2005
IEEE
15 years 5 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ACISP
2005
Springer
15 years 5 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
MIDDLEWARE
2005
Springer
15 years 5 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan