The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Neighborhood Preserving Embedding (NPE) is a famous graph-oriented dimension deduction algorithm, which has got lots of successful applications in computer vision field. Just as all the graph-oriented algorithms, the effectiveness of the NPE greatly relies on whether a suitable graph can be constructed. While the traditional graph construction method has some intrinsic weaknesses, especially when...
To solve the challenging problem of face recognition under varying illumination conditions, we propose in this paper a novel LBP operator which we refer to as Local Binary Patterns with Circle Threshold (CT-LBP) operator. The CT-LBP operator can keep more discriminating information than the original LBP operator without losing the simplicity and effectivity of the original LBP operator. Extensive...
Account services are playing important roles in building IT ecosystems, such as Google Accounts, Apple ID and Microsoft Your Account for the forthcoming windows 8. In this paper, we propose a novel mechanism to build a cloud oriented account service for SME SaaS Ecosystem (SSE), a public cloud ecosystem among small and medium sized enterprises of China. Different from the account services listed above,...
Security mechanisms within DBMSs are far from effective to detect and prevent anomalous behavior of applications and intrusions from attackers. In fact, intrusions executed by unauthorized users to explore system vulnerabilities, and malicious database transactions executed by authorized users, both cannot be detected and prevented by typical security mechanisms. In this paper we proposed a database...
More and more softwares based on web service technologies are developed. Before their releases on the Internet, it is necessary to evaluate these systems' performance, especially their response time under different workload pressures. However, existing performance testing benchmarks and tools for web service applications are difficult to adapt to various user-specific testing purposes. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.