Sciweavers

1486 search results - page 166 / 298
» Firewall Rules Analysis
Sort
View
IJAIT
2007
180views more  IJAIT 2007»
15 years 4 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 4 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
ICPR
2010
IEEE
15 years 2 months ago
A Baseline Dependent Approach for Persian Handwritten Character Segmentation
-- In this paper, an efficient approach to segment Persian off-line handwritten text-line into characters is presented. The proposed algorithm first traces the baseline of the inpu...
Alireza Alaei, P. Nagabhushan, Umapada Pal
DAGM
2009
Springer
15 years 2 months ago
Shadow Detection in Dynamic Scenes Using Dense Stereo Information and an Outdoor Illumination Model
Abstract. We present a system for detecting shadows in dynamic outdoor scenes. The technique is based on fusing background subtraction operations performed on both color and dispar...
Claus B. Madsen, Thomas B. Moeslund, Amit Pal, Sha...
ICDAR
2009
IEEE
15 years 2 months ago
A Kai Style Calligraphic Beautification Method for Handwriting Chinese Character
In this paper, we propose a method that can beautify user's handwriting to the character of Kai style calligraphy. Structural and style features of Chinese character are summ...
Weiping Xia, Lianwen Jin