Sciweavers

751 search results - page 107 / 151
» The Distinguishing Chromatic Number
Sort
View
PST
2004
15 years 16 days ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
SPIESR
2001
133views Database» more  SPIESR 2001»
15 years 16 days ago
Shot detection combining Bayesian and structural information
There are a number of shots in a video, each of which has boundary types, such as cut, fade, dissolve and wipe. Many previous approaches can find the cut boundary without difficul...
Seung-Hoon Han, In-So Kweon
IIS
2003
15 years 16 days ago
Ontology-based Text Document Clustering
Text clustering typically involves clustering in a high dimensional space, which appears difficult with regard to virtually all practical settings. In addition, given a particular...
Steffen Staab, Andreas Hotho
WIS
2004
15 years 16 days ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
MVA
2000
165views Computer Vision» more  MVA 2000»
15 years 15 days ago
Bayesian Shot Detection Using Structural Weighting
A video stream consists of a number of shots each of which has different boundary types such as cut, fade, and dissolve. Many previous approaches can find the cut boundary without...
Seung-Hoon Han, In-So Kweon, Chang-Yeong Kim, Yang...