Sciweavers

585 search results - page 105 / 117
» The Feature Subspace Method for SMT System Combination
Sort
View
DICTA
2007
13 years 9 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
TITB
2008
97views more  TITB 2008»
13 years 7 months ago
A Novel Breast Tissue Density Classification Methodology
Abstract--It has been shown that the accuracy of mammographic abnormality detection methods is strongly dependent on the breast tissue characteristics, where a dense breast drastic...
Arnau Oliver, Jordi Freixenet, Robert Marti, Josep...
FGR
2011
IEEE
354views Biometrics» more  FGR 2011»
12 years 11 months ago
Hierarchical ranking of facial attributes
Abstract— We propose a novel hierarchical structured prediction approach for ranking images of faces based on attributes. We view ranking as a bipartite graph matching problem; l...
Ankur Datta, Rogerio Feris, Daniel A. Vaquero
VLDB
1998
ACM
110views Database» more  VLDB 1998»
14 years 3 days ago
Massive Stochastic Testing of SQL
Deterministic testing of SQL database systems is human intensive and cannot adequately cover the SQL input domain. A system (RAGS), was built to stochastically generate valid SQL ...
Donald R. Slutz
SSR
2001
104views more  SSR 2001»
13 years 9 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...