Sciweavers

1325 search results - page 135 / 265
» The Incidence Propagation Method
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
ACSAC
1998
IEEE
14 years 1 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
SIGGRAPH
2000
ACM
14 years 14 days ago
Acquiring the reflectance field of a human face
We present a method to acquire the reflectance field of a human face and use these measurements to render the face under arbitrary changes in lighting and viewpoint. We first acqu...
Paul E. Debevec, Tim Hawkins, Chris Tchou, Haarm-P...
DGO
2008
170views Education» more  DGO 2008»
13 years 10 months ago
Natural language processing and e-Government: crime information extraction from heterogeneous data sources
Much information that could help solve and prevent crimes is never gathered because the reporting methods available to citizens and law enforcement personnel are not optimal. Dete...
Chih Hao Ku, Alicia Iriberri, Gondy Leroy
SDM
2007
SIAM
122views Data Mining» more  SDM 2007»
13 years 10 months ago
Incremental Spectral Clustering With Application to Monitoring of Evolving Blog Communities
In recent years, spectral clustering method has gained attentions because of its superior performance compared to other traditional clustering algorithms such as K-means algorithm...
Huazhong Ning, Wei Xu, Yun Chi, Yihong Gong, Thoma...