Sciweavers

470 search results - page 82 / 94
» Reading a Neural Code
Sort
View
HAIS
2010
Springer
15 years 4 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
CVPR
2008
IEEE
15 years 1 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
ICONIP
2007
15 years 1 months ago
Sparse Super Symmetric Tensor Factorization
In the paper we derive and discuss a wide class of algorithms for 3D Super-symmetric nonnegative Tensor Factorization (SNTF) or nonnegative symmetric PARAFAC, and as a special case...
Andrzej Cichocki, Marko Jankovic, Rafal Zdunek, Sh...
98
Voted
IJIT
2004
15 years 1 months ago
Morphing Human Faces: Automatic Control Points Selection And Color Transition
In this paper, we propose a morphing method by which face color images can be freely transformed. The main focus of this work is the transformation of one face image to another. Th...
Stephen Karungaru, Minoru Fukumi, Norio Akamatsu
100
Voted
NIPS
2004
15 years 1 months ago
Assignment of Multiplicative Mixtures in Natural Images
In the analysis of natural images, Gaussian scale mixtures (GSM) have been used to account for the statistics of filter responses, and to inspire hierarchical cortical representat...
Odelia Schwartz, Terrence J. Sejnowski, Peter Daya...