Sciweavers

833 search results - page 23 / 167
» Wallet Databases with Observers
Sort
View
106
Voted
CICLING
2005
Springer
15 years 8 months ago
A Prosodic Diphone Database for Korean Text-to-Speech Synthesis System
This paper presents a prosodically conditioned diphone database to be used in a Korean text-to-speech (TTS) synthesis system. The diphones are prosodically conditioned in the sense...
Kyuchul Yoon
119
Voted
ESORICS
1994
Springer
15 years 6 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
123
Voted
ACMSE
2006
ACM
15 years 8 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
122
Voted
MSS
2008
IEEE
89views Hardware» more  MSS 2008»
15 years 2 months ago
Axiomatization of an exponential similarity function
An individual is asked to assess a real-valued variable y based on certain characteristics x=(x1 ,..., xm ), and on a database consisting of n observations of (x1 ,..., xm , y). A...
Antoine Billot, Itzhak Gilboa, David Schmeidler
123
Voted
ICCV
2005
IEEE
16 years 4 months ago
Detecting Irregularities in Images and in Video
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term &qu...
Oren Boiman, Michal Irani