Sciweavers

109 search results - page 2 / 22
» Pattern Recognition Systems under Attack
Sort
View
ICPR
2010
IEEE
13 years 11 months ago
On-Line Video Recognition and Counting of Harmful Insects
This article is concerned with on-line counting of harmful insects of certain species in videos in the framework of in situ video-surveillance that aims at the early detection of ...
Ikhlef Bechar
IBPRIA
2009
Springer
13 years 10 months ago
Score Fusion by Maximizing the Area under the ROC Curve
Information fusion is currently a very active research topic aimed at improving the performance of biometric systems. This paper proposes a novel method for optimizing the paramete...
Mauricio Villegas, Roberto Paredes
ICC
2007
IEEE
164views Communications» more  ICC 2007»
13 years 11 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ITNG
2008
IEEE
13 years 11 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
AUSAI
2003
Springer
13 years 10 months ago
Reduction of Non Deterministic Automata for Hidden Markov Model Based Pattern Recognition Applications
Most on-line cursive handwriting recognition systems use a lexical constraint to help improve the recognition performance. Traditionally, the vocabulary lexicon is stored in a trie...
Frédéric Maire, Frank Wathne, Alain ...