Sciweavers

450 search results - page 86 / 90
» Component Engineering for Large Database Applications
Sort
View
IWPC
2005
IEEE
14 years 28 days ago
System Evolution Tracking through Execution Trace Analysis
Software evolution analysis is concerned with analysis of artifacts produced during a software systems life-cycle. Execution traces produced from instrumented code reflect a syst...
Michael Fischer, Johann Oberleitner, Harald Gall, ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
PAMI
2012
11 years 9 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
BMCBI
2005
134views more  BMCBI 2005»
13 years 7 months ago
Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)
Background: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local ...
Scot E. Dowd, Joaquin Zaragoza, Javier R. Rodrigue...
FGR
2004
IEEE
167views Biometrics» more  FGR 2004»
13 years 11 months ago
Adaptive Learning of an Accurate Skin-Color Model
Due to variations of lighting conditions, camera hardware settings, and the range of skin coloration among human beings, a pre-defined skin-color model cannot accurately capture t...
Qiang Zhu, Kwang-Ting Cheng, Ching-Tung Wu, Yi-Leh...