Sciweavers

4272 search results - page 788 / 855
» A Case for Automatic System Evaluation
Sort
View
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 9 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
WAIM
2009
Springer
14 years 3 months ago
Personalized Delivery of On-Line Search Advertisement Based on User Interests
Search engine advertising has become the main stream of online advertising system. In current search engine advertising systems, all users will get the same advertisement rank if t...
Guangyi Xiao, Zhiguo Gong
CAIP
2009
Springer
221views Image Analysis» more  CAIP 2009»
14 years 3 months ago
Model Based Analysis of Face Images for Facial Feature Extraction
This paper describes a comprehensive approach to extract a common feature set from the image sequences. We use simple features which are easily extracted from a 3D wireframe model ...
Zahid Riaz, Christoph Mayer, Michael Beetz, Bernd ...
MM
2009
ACM
209views Multimedia» more  MM 2009»
14 years 3 months ago
Brain state decoding for rapid image retrieval
Human visual perception is able to recognize a wide range of targets under challenging conditions, but has limited throughput. Machine vision and automatic content analytics can p...
Jun Wang, Eric Pohlmeyer, Barbara Hanna, Yu-Gang J...
ACSAC
2008
IEEE
14 years 3 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh