Sciweavers

1989 search results - page 220 / 398
» A framework for testing database applications
Sort
View
ICASSP
2011
IEEE
12 years 12 months ago
BEMD for expression transformation in face recognition
This work presents a novel methodology for the transformation of facial expressions, to assist face biometrics. It is known that identification using only one image per subject p...
Hoda Mohammadzade, Foteini Agrafioti, Jiexin Gao, ...
CCS
2011
ACM
12 years 8 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
ICDE
2000
IEEE
121views Database» more  ICDE 2000»
14 years 9 months ago
Creating a Customized Access Method for Blobworld
We present the design and analysis of a customized access method for the content-based image retrieval system, Blobworld. Using the amdb access method analysis tool, we analyzed t...
Megan Thomas, Chad Carson, Joseph M. Hellerstein
SIGMOD
2005
ACM
135views Database» more  SIGMOD 2005»
14 years 8 months ago
Mining data streams: a review
The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously an...
Mohamed Medhat Gaber, Arkady B. Zaslavsky, Shonali...
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
14 years 2 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung