Sciweavers

873 search results - page 100 / 175
» step 2005
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
APSEC
2005
IEEE
15 years 10 months ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi
ARITH
2005
IEEE
15 years 10 months ago
The Residue Logarithmic Number System: Theory and Implementation
— The Residue Logarithmic Number System (RLNS) represents real values as quantized logarithms which, in turn, are represented using the Residue Number System (RNS). Compared to t...
Mark G. Arnold
134
Voted
AVSS
2005
IEEE
15 years 10 months ago
A hybrid technique for face detection in color images
In this paper, a hybrid technique for face detection in color images is presented. The proposed technique combines three analysis models, namely skin detection, automatic eye loca...
Saman Hemantha Cooray, Noel E. O'Connor
117
Voted
AVSS
2005
IEEE
15 years 10 months ago
Performance evaluation of event detection solutions: the CREDS experience
In video surveillance projects, automatic and realtime event detection solutions are required to guarantee an efficient and cost-effective use of the infrastructure. Many solution...
Francesco Ziliani, Sergio A. Velastin, Fatih Porik...