Sciweavers

2386 search results - page 16 / 478
» Database Security 2000
Sort
View
HVEI
2010
14 years 7 months ago
No-reference image quality assessment based on localized gradient statistics: application to JPEG and JPEG2000
This paper presents a novel system that employs an adaptive neural network for the no-reference assessment of perceived quality of JPEG/JPEG2000 coded images. The adaptive neural ...
Hantao Liu, Judith Redi, Hani Alers, Rodolfo Zunin...
SP
2000
IEEE
15 years 2 months ago
Will Openish Source Really Improve Security
Will openish source really improve security? No.
Gary McGraw
CORR
2000
Springer
100views Education» more  CORR 2000»
14 years 9 months ago
Algorithms for Analysing Firewall and Router Access Lists
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
Scott Hazelhurst
CAISE
2004
Springer
15 years 3 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau