Sciweavers

1585 search results - page 163 / 317
» Automatically optimizing secure computation
Sort
View
TSMC
2010
13 years 2 months ago
Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition
Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the ...
Emanuele Maiorana, Patrizio Campisi, Julian Fi&eac...
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 8 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
CVPR
2007
IEEE
14 years 10 months ago
Quality-Driven Face Occlusion Detection and Recovery
This paper presents a framework to automatically detect and recover the occluded facial region. We first derive a Bayesian formulation unifying the occlusion detection and recover...
Dahua Lin, Xiaoou Tang
CVPR
2010
IEEE
14 years 1 months ago
Neuron Geometry Extraction by Perceptual Grouping in ssTEM images
In the field of neuroanatomy, automatic segmentation of electron microscopy images is becoming one of the main limiting factors in getting new insights into the functional struct...
Verena Kaynig, Thomas Fuchs, Joachim Buhmann
EUSAI
2004
Springer
14 years 1 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira