Sciweavers

2327 search results - page 381 / 466
» Secure Image Filtering
Sort
View
CIVR
2006
Springer
131views Image Analysis» more  CIVR 2006»
15 years 5 months ago
Exploring the Synergy of Humans and Machines in Extreme Video Retrieval
We introduce an interface for efficient video search that exploits the human ability to quickly scan visual content, after automatic retrieval has arrange the images in expected or...
Alexander G. Hauptmann, Wei-Hao Lin, Rong Yan, Jun...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 7 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
ESORICS
2009
Springer
15 years 5 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 1 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
ICPIA
1992
15 years 5 months ago
Intelligent Pattern Recognition and Applications
:: This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and ...
Patrick Shen-Pei Wang