Sciweavers

108 search results - page 4 / 22
» The BANCA Database and Evaluation Protocol
Sort
View
ICIP
2004
IEEE
14 years 11 months ago
Estimating the quality of face localization for face verification
Face localization is the process of finding the exact position of a face in a given image. This can be useful in several applications such as face tracking or person authenticatio...
Yann Rodriguez, Fabien Cardinaux, Samy Bengio, Joh...
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
13 years 7 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
COMPUTE
2010
ACM
14 years 2 months ago
Performance evaluation of speculation-based protocol for read-only transactions
In the literature, speculation-based protocols have been proposed to improve the performance of read-only transactions (ROTs) over the existing two-phase locking (2PL) and snapsho...
Thirumalaisamy Ragunathan, P. Krishna Reddy
RTSS
1996
IEEE
14 years 1 months ago
Commit processing in distributed real-time database systems
W e investigate here the performance implications of supporting transaction atomicity in a distributed realtime database system. Using a detailed simulation model of a firm-deadli...
Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritha...
SIGMOD
2004
ACM
114views Database» more  SIGMOD 2004»
14 years 10 months ago
Evaluating lock-based protocols for cooperation on XML documents
We discuss four different core protocols for synchronizing access to and modifications of XML document collections. These core protocols synchronize structure traversals and modif...
Sven Helmer, Carl-Christian Kanne, Guido Moerkotte