Sciweavers

1403 search results - page 247 / 281
» Security Model for XML Data
Sort
View
OOPSLA
2005
Springer
14 years 2 months ago
SDD: high performance code clone detection system for large scale source code
Code clones in software increase maintenance cost and lower software quality. We have devised a new algorithm to detect duplicated parts of source code in large software. Our algo...
Seunghak Lee, Iryoung Jeong
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
13 years 10 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara
CORR
2000
Springer
138views Education» more  CORR 2000»
13 years 8 months ago
Towards rule-based visual programming of generic visual systems
This paper illustrates how the diagram programming language DIAPLAN can be used to program visual systems. DIAPLAN is a visual rulebased language that is founded on the computation...
Berthold Hoffmann, Mark Minas
TIFS
2010
123views more  TIFS 2010»
13 years 7 months ago
A new framework for adaptive multimodal biometrics management
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to ensure the optimal performance for the desired level of security. The adaptive c...
Ajay Kumar, Vivek Kanhangad, David Zhang
AMW
2011
13 years 8 days ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis