Sciweavers

2327 search results - page 406 / 466
» Secure Image Filtering
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 11 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
ACIVS
2009
Springer
14 years 11 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
ESCIENCE
2007
IEEE
15 years 7 months ago
Building a Data Grid for the Australian Nanostructural Analysis Network
: This paper describes the architecture and services developed by the GRANI project for the Australian Nanostructural Analysis Network Organization (NANO). The aim of GRANI was to ...
Brendan Mauger, Jane Hunter, John Drennan, Ashley ...
ISSTA
2010
ACM
15 years 5 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder
ICIP
2005
IEEE
16 years 3 months ago
Multi-view face pose classification by tree-structured classifier
In this paper, a multi-view face pose classification method is introduced. Each face region is normalized by two eye-centers and mouth center, and then multi-class classifiers are...
Zhiguang Yang, Haizhou Ai, Takuya Okamoto, Shihong...