Sciweavers

1497 search results - page 260 / 300
» Constraint Databases: A Survey
Sort
View
DCC
2008
IEEE
14 years 1 months ago
Shared Descriptions Fusion Coding for Storage and Selective Retrieval of Correlated Sources
Motivated by sensor networks, we consider the fusion storage of correlated sources in a database, such that any subset of them may be efficiently retrieved in the future. Only st...
Sharadh Ramaswamy, Kenneth Rose
ICPR
2008
IEEE
14 years 1 months ago
Representative feature chain for single gallery image face recognition
Under the constraint of using only a single gallery image per person, this paper proposes a fast multi-class pattern classification approach to 2D face recognition robust to chan...
Shaokang Chen, Conrad Sanderson, Sai Sun, Brian C....
COMPSAC
2007
IEEE
14 years 1 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
ICASSP
2007
IEEE
14 years 1 months ago
Toward Turbo Decoding of RNA Secondary Structure
We propose an iterative probabilistic algorithm for estimation of RNA secondary structure using sequence data from two homologous sequences. The method is intended to exploit inte...
Arif Ozgun Harmanci, Gaurav Sharma, David H. Mathe...
ER
2007
Springer
193views Database» more  ER 2007»
14 years 1 months ago
Applying Model Transformation By-Example on Business Process Modeling Languages
Model transformations are playing a vital role in the field of model engineering. However, for non-trivial transformation issues most approaches require imperative definitions, w...
Michael Strommer, Marion Murzek, Manuel Wimmer