Sciweavers

827 search results - page 63 / 166
» Patterns for Timed Property Specifications
Sort
View
ESORICS
2008
Springer
15 years 5 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 10 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
ISM
2005
IEEE
91views Multimedia» more  ISM 2005»
15 years 8 months ago
Research on the Discrimination of Pornographic and Bikini Images
Our research extends the general technologies detecting pornographic images to prevent the benign images whose content is approximate with the pornographic ones from being screene...
Yushi Wang, Weiqiang Wang, Wen Gao
CIARP
2006
Springer
15 years 7 months ago
Gender Classification of Faces Using Adaboost
In this work it is described a framework for classifying face images using Adaboost and domain-partitioning based classifiers. The most interesting aspect of this framework is the ...
Rodrigo Verschae, Javier Ruiz-del-Solar, Mauricio ...
IJAIT
2007
180views more  IJAIT 2007»
15 years 3 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas