Sciweavers

166 search results - page 20 / 34
» iis 2000
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
CVPR
2000
IEEE
14 years 2 months ago
Segmentation with Invisible Keying Signal
Croma keying is the process of segmenting objects from images and video using color cues. A blue (or green) screen placed behind an object during recording is used in special effe...
Moshe Ben-Ezra
DSN
2000
IEEE
14 years 2 months ago
Implementing Flexible Object Group Invocation in Networked Systems
Distributed applications should be able to make use of an object group service in a number of application specific ways. Three main modes of interactions can be identified: (i) re...
Graham Morgan, Santosh K. Shrivastava
DSN
2000
IEEE
14 years 2 months ago
Reliability Testing of Applications on Windows NT
The DTS (Dependability Test Suite) fault injection tool can be used to (1) obtain fault injection-based evaluation of system reliability, (2) compare the reliability of different ...
Timothy K. Tsai, Navjot Singh
FGR
2000
IEEE
158views Biometrics» more  FGR 2000»
14 years 2 months ago
Dual-State Parametric Eye Tracking
Most eye trackers work well for open eyes. However, blinking is a physiological necessity for humans. Moreover, for applicationssuch as facial expression analysis and driver aware...
Ying-li Tian, Takeo Kanade, Jeffrey F. Cohn