Sciweavers

2610 search results - page 191 / 522
» codes 2007
Sort
View
MVA
1990
101views Computer Vision» more  MVA 1990»
15 years 5 months ago
A Segmentation Free Approach to Symbol Extraction and Recognition from Image Document
: We present a symbol recognition method without segmentation of the document. Our approach uses Zernike moments for the coding and a multilayered Perceptron for the classifier. Re...
Maurice Milgram, Mattieu Jobert, Bertrand Lamy
JOT
2007
99views more  JOT 2007»
15 years 4 months ago
On the Footprints of Join Points: The Blueprint Approach
nt selection mechanism at a high-level of abstraction to decouple aspects from the application code. To this regard, we adopt a high-level pattern-based join point model, where joi...
Walter Cazzola, Sonia Pini
BC
2000
86views more  BC 2000»
15 years 4 months ago
Self-organizing maps for visual feature representation based on natural binocular stimuli
We model the stimulus-induced development of the topography of the primary visual cortex. The analysis uses a self-organizing Kohonen model based on high-dimensional coding. It all...
Jan C. Wiemer, Thomas Burwick, Werner von Seelen
ACSAC
2007
IEEE
15 years 10 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
AINA
2007
IEEE
15 years 10 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay