Sciweavers

751 search results - page 107 / 151
» The Distinguishing Chromatic Number
Sort
View
PST
2004
15 years 2 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
115
Voted
SPIESR
2001
133views Database» more  SPIESR 2001»
15 years 2 months ago
Shot detection combining Bayesian and structural information
There are a number of shots in a video, each of which has boundary types, such as cut, fade, dissolve and wipe. Many previous approaches can find the cut boundary without difficul...
Seung-Hoon Han, In-So Kweon
IIS
2003
15 years 2 months ago
Ontology-based Text Document Clustering
Text clustering typically involves clustering in a high dimensional space, which appears difficult with regard to virtually all practical settings. In addition, given a particular...
Steffen Staab, Andreas Hotho
144
Voted
WIS
2004
15 years 2 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
130
Voted
MVA
2000
165views Computer Vision» more  MVA 2000»
15 years 2 months ago
Bayesian Shot Detection Using Structural Weighting
A video stream consists of a number of shots each of which has different boundary types such as cut, fade, and dissolve. Many previous approaches can find the cut boundary without...
Seung-Hoon Han, In-So Kweon, Chang-Yeong Kim, Yang...