Sciweavers

1737 search results - page 45 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NN
2002
Springer
114views Neural Networks» more  NN 2002»
15 years 4 months ago
Learning the parts of objects by auto-association
Recognition-by-components is one of the possible strategies proposed for object recognition by the brain, but little is known about the low-level mechanism by which the parts of o...
Xijin Ge, Shuichi Iwata
ICSM
2002
IEEE
15 years 9 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
IJCNN
2007
IEEE
15 years 10 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...
IH
2005
Springer
15 years 10 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
IJON
2010
129views more  IJON 2010»
15 years 2 months ago
Robust object tracking using a spatial pyramid heat kernel structural information representation
In this paper, we propose an object tracking framework based on a spatial pyramid heat kernel structural information representation. In the tracking framework, we take advantage o...
Xi Li, Weiming Hu, Hanzi Wang, Zhongfei Zhang