Sciweavers

554 search results - page 50 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
ESSOS
2009
Springer
14 years 9 days ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
JUCS
2007
152views more  JUCS 2007»
13 years 7 months ago
The SEWASIE Network of Mediator Agents for Semantic Search
: Integration of heterogeneous information in the context of Internet becomes a key activity to enable a more organized and semantically meaningful access to data sources. As Inter...
Domenico Beneventano, Sonia Bergamaschi, Francesco...
KSEM
2009
Springer
14 years 2 months ago
A Competitive Learning Approach to Instance Selection for Support Vector Machines
Abstract. Support Vector Machines (SVM) have been applied successfully in a wide variety of fields in the last decade. The SVM problem is formulated as a convex objective function...
Mario Zechner, Michael Granitzer
IJCNN
2000
IEEE
14 years 2 days ago
ICA for Noisy Neurobiological Data
ICA (Independent Component Analysis) is a new technique for analyzing multi-variant data. Lots of results are reported in the field of neurobiological data analysis such as EEG (...
Shiro Ikeda, Keisuke Toyama
IFIP12
2009
13 years 5 months ago
Unification of Heterogeneous Data Towards the Prediction of Oral Cancer Reoccurrence
Oral cancer is the predominant neoplasm of the head and neck. Annually, more than 500.000 new cases of oral cancer are reported, worldwide. After the initial treatment of cancer an...
Costas P. Exarchos, Yorgos Goletsis, Dimitrios I. ...