Sciweavers

8177 search results - page 374 / 1636
» Detecting System Emulators
Sort
View
ICIP
2006
IEEE
16 years 5 months ago
Real Time Lip Motion Analysis for a Person Authentication System using Near Infrared Illumination
In this paper we present an approach for lip motion analysis that can be used in conjunction with a person authentication system based on face recognition, to avoid attacks on the...
Faisal Shafait, Ralph Kricke, Islam Shdaifat, Rolf...
ICWL
2007
Springer
15 years 10 months ago
A Web-Based E-Testing System Supporting Test Quality Improvement
In e-testing it is important to administer tests composed of good quality question items. By the term “quality” we intend the potential of an item in effectively discriminating...
Gennaro Costagliola, Filomena Ferrucci, Vittorio F...
ICARIS
2007
Springer
15 years 7 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
ACII
2005
Springer
15 years 5 months ago
Face and Facial Expression Recognition with an Embedded System for Human-Robot Interaction
In this paper, we present an embedded system in which face recognition and facial expression recognition for Human-Robot Interaction are implemented. To detect face with a fast and...
Yang-Bok Lee, Seungbin Moon, Yong-Guk Kim
120
Voted
AAAI
1994
15 years 5 months ago
Termination Analysis of OPS5 Expert Systems
Bounded response time is an important requirement when rule-based expert systems are used in real-time applications. In the case the rule-based system cannot terminate in bounded ...
Hsiu-yen Tsai, Albert Mo Kim Cheng