Sciweavers

10263 search results - page 2034 / 2053
» From Use Cases to System Operation Specifications
Sort
View
ICAPR
2009
Springer
14 years 1 months ago
Eigen-domain Relighting of Face Images for Illumination-invariant Face Verification
In this paper, we propose a method to exploit the uniqueness in the illumination variations on the face image of a subject for face verification. Using the 3D wireframe model of a...
Vinod Pathangay, Sukhendu Das
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
14 years 1 months ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang
COMSWARE
2006
IEEE
14 years 11 days ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
CCS
2008
ACM
13 years 10 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
BCSHCI
2008
13 years 10 months ago
Low cost prototyping: part 2, or how to apply the thinking-aloud method efficiently
Customer satisfaction with regard to user interfaces becomes increasingly more important and is, eventually, decisive for the selection of systems within a competitive market. End...
Andreas Holzinger, Stephen Brown
« Prev « First page 2034 / 2053 Last » Next »