Sciweavers

833 search results - page 23 / 167
» Wallet Databases with Observers
Sort
View
CICLING
2005
Springer
14 years 3 months ago
A Prosodic Diphone Database for Korean Text-to-Speech Synthesis System
This paper presents a prosodically conditioned diphone database to be used in a Korean text-to-speech (TTS) synthesis system. The diphones are prosodically conditioned in the sense...
Kyuchul Yoon
ESORICS
1994
Springer
14 years 1 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
ACMSE
2006
ACM
14 years 4 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
MSS
2008
IEEE
89views Hardware» more  MSS 2008»
13 years 10 months ago
Axiomatization of an exponential similarity function
An individual is asked to assess a real-valued variable y based on certain characteristics x=(x1 ,..., xm ), and on a database consisting of n observations of (x1 ,..., xm , y). A...
Antoine Billot, Itzhak Gilboa, David Schmeidler
ICCV
2005
IEEE
15 years 7 hour ago
Detecting Irregularities in Images and in Video
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term &qu...
Oren Boiman, Michal Irani