Sciweavers

10210 search results - page 164 / 2042
» Configuring Database Systems
Sort
View
BMVC
2010
13 years 5 months ago
"How old are you?" : Age Estimation with Tensors of Binary Gaussian Receptive Maps
In this paper we describe experiments with a method to automatically estimate human age from facial images. This system extends recent results with the use of a tensorial represen...
John A. Ruiz-Hernandez, James L. Crowley, Augustin...
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
CSREASAM
2009
13 years 11 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
BTW
2007
Springer
110views Database» more  BTW 2007»
14 years 4 months ago
Melting Pot XML: Bringing File Systems and Databases One Step Closer
: Ever-growing data volumes demand for storage systems beyond current file systems abilities, particularly, a powerful querying capability. With the rise of XML, the database comm...
Alexander Holupirek, Christian Grün, Marc H. ...
XSYM
2004
Springer
161views Database» more  XSYM 2004»
14 years 3 months ago
Adjustable Transaction Isolation in XML Database Management Systems
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...
Michael Peter Haustein, Theo Härder