Sciweavers

1016 search results - page 167 / 204
» Evaluation of Expression Recognition Techniques
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 10 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
IJPRAI
2000
135views more  IJPRAI 2000»
13 years 9 months ago
Towards Unrestricted Lip Reading
Lip reading provides useful information in speech perception and language understanding, especially when the auditory speech is degraded. However, many current automatic lip readi...
Uwe Meier, Rainer Stiefelhagen, Jie Yang, Alex Wai...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 8 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
ICDE
2004
IEEE
137views Database» more  ICDE 2004»
14 years 11 months ago
Selectivity Estimation for XML Twigs
Twig queries represent the building blocks of declarative query languages over XML data. A twig query describes a complex traversal of the document graph and generates a set of el...
Neoklis Polyzotis, Minos N. Garofalakis, Yannis E....
SIGMOD
2001
ACM
95views Database» more  SIGMOD 2001»
14 years 10 months ago
Updating XML
As XML has developed over the past few years, its role has expanded beyond its original domain as a semantics-preserving markup language for online documents, and it is now also t...
Igor Tatarinov, Zachary G. Ives, Alon Y. Halevy, D...