Sciweavers

138 search results - page 15 / 28
» 06371 Abstracts Collection -- From Security to Dependability
Sort
View
JUCS
2010
145views more  JUCS 2010»
13 years 6 months ago
Block-based Against Segmentation-based Texture Image Retrieval
Abstract: This paper concerns the best approach to the capture of local texture features for use in content-based image retrieval (CBIR) applications. From our previous work, two a...
Mohammad Faizal Ahmad Fauzi, Paul H. Lewis
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 25 days ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 1 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
ICCCN
1998
IEEE
13 years 12 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
13 years 5 months ago
Discovering Temporal Features and Relations of Activity Patterns
An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
Ehsan Nazerfard, Parisa Rashidi, Diane J. Cook