Sciweavers

1828 search results - page 148 / 366
» From Features to Semantics: Some Preliminary Results
Sort
View
ICCS
2007
Springer
15 years 5 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
ACSAC
2004
IEEE
15 years 5 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
MVA
2007
165views Computer Vision» more  MVA 2007»
15 years 3 months ago
Self-Calibration for Metric 3D Reconstruction Using Homography
In this paper, our goal is to reconstruct metric 3D models for large structures (or other 3D objects) from uncalibrated images. The internal camera parameters are estimated by usi...
Cheng-Yuan Tang, Yi-Leh Wu, Pei-Ching Hu, Hsien-Ch...
HCSE
2010
14 years 11 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
ICASSP
2010
IEEE
15 years 1 months ago
Characterization of movie genre based on music score
While it is clear that the full emotional effect of a movie scene is carried through the successful interpretation of audio and visual information, music still carries a significa...
Aida Austin, Elliot Moore II, Udit Gupta, Parag Ch...