Sciweavers

2874 search results - page 553 / 575
» Intrusion Detection: Systems and Models
Sort
View
MBEES
2008
13 years 11 months ago
Composition of Model-based Test Coverage Criteria
: In this paper, we discuss adjustable coverage criteria and their combinations in model-based testing. We formalize coverage criteria and specify test goals using OCL. Then, we pr...
Mario Friske, Bernd-Holger Schlingloff, Stephan We...
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
13 years 10 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
ICPR
2006
IEEE
14 years 11 months ago
Face Recognition Robust to Head Pose from One Sample Image
Most face recognition systems only work well under quite constrained environments. In particular, the illumination conditions, facial expressions and head pose must be tightly con...
Brian C. Lovell, Shaokang Chen, Ting Shan
WWW
2007
ACM
14 years 10 months ago
Csurf: a context-driven non-visual web-browser
Web sites are designed for graphical mode of interaction. Sighted users can "cut to the chase" and quickly identify relevant information in Web pages. On the contrary, i...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 4 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...