Sciweavers

2838 search results - page 543 / 568
» Verifying Controlled Components
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
AUTOID
2005
IEEE
14 years 1 months ago
Fully Automated Facial Symmetry Axis Detection in Frontal Color Images
In this paper, we consider the problem of automatically detecting a facial symmetry axis in what we will call a standard human face image (acquired when the subject is looking dir...
Xin Chen, Patrick J. Flynn, Kevin W. Bowyer
ICDAR
2005
IEEE
14 years 1 months ago
Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons
Automatic text recognition from natural images receives a growing attention because of potential applications in image retrieval, robotics and intelligent transport system. Camera...
Nobuo Ezaki, Kimiyasu Kiyota, Bui Truong Minh, Mar...
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
14 years 1 months ago
Effective Constrained Dynamic Simulation Using Implicit Constraint Enforcement
- Stable and effective enforcement of hard constraints is one of the crucial components in controlling physics-based dynamic simulation systems. The conventional explicit Baumgarte...
Min Hong, Min-Hyung Choi, Sunhwa Jung, Samuel W. J...
QEST
2005
IEEE
14 years 1 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel