Sciweavers

94 search results - page 14 / 19
» Performance Forensics
Sort
View
ICARCV
2008
IEEE
222views Robotics» more  ICARCV 2008»
14 years 1 months ago
Robust fusion using boosting and transduction for component-based face recognition
—Face recognition performance depends upon the input variability as encountered during biometric data capture including occlusion and disguise. The challenge met in this paper is...
Fayin Li, Harry Wechsler, Massimo Tistarelli
ESORICS
2005
Springer
14 years 1 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
14 years 24 days ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
COMPSAC
2009
IEEE
14 years 6 days ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
USENIX
2007
13 years 9 months ago
Hyperion: High Volume Stream Archival for Retrospective Querying
Network monitoring systems that support data archival and after-the-fact (retrospective) queries are useful for a multitude of purposes, such as anomaly detection and network and ...
Peter Desnoyers, Prashant J. Shenoy