Sciweavers

2205 search results - page 440 / 441
» Mutation Operators for Specifications
Sort
View
PAA
2010
13 years 1 months ago
A comparative study on feature extraction for fingerprint classification and performance improvements using rank-level fusion
Abstract Fingerprint classification represents an important preprocessing step in fingerprint identification, which can be very helpful in reducing the cost of searching large fing...
Uday Rajanna, Ali Erol, George Bebis
SIAMCO
2010
169views more  SIAMCO 2010»
13 years 1 months ago
Shape Derivative of Drag Functional
Abstract. In the paper compressible, stationary Navier-Stokes (N-S) equations are considered. The model is well-posed, there exist weak solutions in bounded domains, subject to inh...
Pavel I. Plotnikov, Jan Sokolowski
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
13 years 1 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...
TC
2010
13 years 1 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
TISSEC
2010
119views more  TISSEC 2010»
13 years 1 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...