Sciweavers

427 search results - page 67 / 86
» Discovering Robust Knowledge from Databases that Change
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
ICPR
2006
IEEE
14 years 8 months ago
Face Recognition by Expression-Driven Sketch Graph Matching
We present a novel face recognition method using automatically extracted sketch by a multi-layer grammatical face model. First, the observed face is parsed into a 3layer (face, pa...
Jiebo Luo, Zijian Xu
LISA
2004
13 years 9 months ago
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments
Periodic data backup is a system administration requirement that has changed as wireless machines have altered the fundamental structure of networks. These changes necessitate a c...
Gregory Pluta, Larry Brumbaugh, William Yurcik, Jo...
CVPR
2008
IEEE
14 years 9 months ago
Face tracking and recognition with visual constraints in real-world videos
We address the problem of tracking and recognizing faces in real-world, noisy videos. We track faces using a tracker that adaptively builds a target model reflecting changes in ap...
Minyoung Kim, Sanjiv Kumar, Vladimir Pavlovic, Hen...
DRM
2003
Springer
14 years 25 days ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia