Sciweavers

4166 search results - page 108 / 834
» Automating the constraining process
Sort
View
JLP
2008
75views more  JLP 2008»
14 years 10 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...
CIA
2007
Springer
15 years 4 months ago
Managing Sensors and Information Sources Using Semantic Matchmaking and Argumentation
Abstract. Effective deployment and utilisation of limited and constrained intelligence resources — including sensors and other sources — is seen as a key issue in modern multin...
Alun D. Preece
FGR
2000
IEEE
123views Biometrics» more  FGR 2000»
15 years 2 months ago
A Fast and Accurate Face Detector for Indexation of Face Images
Detecting faces in images with complex backgrounds is a difficult task. Our approach, which obtains state of the art results, is based on a generative neural network model: the C...
Raphaël Feraud, Olivier Bernier, Jean-Emmanue...
IJCAI
2003
14 years 11 months ago
Multi-prototype Support Vector Machine
We extend multiclass SVM to multiple prototypes per class. For this framework, we give a compact constrained quadratic problem and we suggest an efficient algorithm for its optimi...
Fabio Aiolli, Alessandro Sperduti
IAJIT
2010
85views more  IAJIT 2010»
14 years 8 months ago
Hiding Text Information in a Digital Image Based on Entropy Function
: The paper is concerned with hiding information into a digital image, specifically, an English text is used to be hidden into a digital grey-scale image. The purpose of this resea...
Nasser Hamad