Sciweavers

854 search results - page 149 / 171
» From Fuzzy - to Bipolar - Datalog
Sort
View
SP
2009
IEEE
15 years 4 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
HT
2009
ACM
15 years 4 months ago
Weblog as a personal thinking space
While weblogs have been conceptualised as personal thinking spaces since their early days, those uses have not been studied in detail. The purpose of this paper is to explore how ...
Lilia Efimova
ICRA
2008
IEEE
162views Robotics» more  ICRA 2008»
15 years 4 months ago
Vision-based estimation of slip angle for mobile robots and planetary rovers
— For a mobile robot it is critical to detect and compensate for slippage, especially when driving in rough terrain environments. Due to its highly unpredictable nature, drift la...
Giulio Reina, Genya Ishigami, Keiji Nagatani, Kazu...
IEEEIAS
2008
IEEE
15 years 4 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
ICNSC
2007
IEEE
15 years 4 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen