Sciweavers

1153 search results - page 141 / 231
» An Automatic Feature Based Face Authentication System,
Sort
View
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 8 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
127
Voted
JCIT
2008
124views more  JCIT 2008»
15 years 3 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
EUROMICRO
2006
IEEE
15 years 9 months ago
Value-Based Selection of Requirements Engineering Tool Support
In large software and systems engineering companies like Siemens PSE there are several requirements tools in use. There is no ā€œone tool fits all projects/departmentsā€ solution...
Matthias Heindl, Franz Reinisch, Stefan Biffl, Ale...
131
Voted
ICIAR
2004
Springer
15 years 9 months ago
Appearance-Based Object Detection in Space-Variant Images: A Multi-model Approach
Recently, log-polar images have been successfully used in active-vision tasks such as vergence control or target tracking. However, while the role of foveal data has been exploited...
V. Javier Traver, Alexandre Bernardino, Plinio Mor...
169
Voted
CIKM
2009
Springer
15 years 10 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...