Sciweavers

54 search results - page 9 / 11
» Adaptive Pattern Matching on Binary Data
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
COLT
1995
Springer
13 years 11 months ago
Regression NSS: An Alternative to Cross Validation
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
Michael P. Perrone, Brian S. Blais
FGR
2008
IEEE
288views Biometrics» more  FGR 2008»
14 years 2 months ago
Face recognition with temporal invariance: A 3D aging model
The variation caused by aging has not received adequate attention compared with pose, lighting, and expression variations. Aging is a complex process that affects both the 3D shap...
Unsang Park, Yiying Tong, Anil K. Jain
ICIP
2009
IEEE
14 years 8 months ago
Asymmetric 3d/2d Face Recognition Based On Lbp Facial Representation And Canonical Correlation Analysis
In the recent years, 3D Face recognition has emerged as a major solution to deal with the unsolved issues for reliable 2D face recognition, i.e. lighting condition and viewpoint v...
BMCBI
2005
157views more  BMCBI 2005»
13 years 7 months ago
Decision Forest Analysis of 61 Single Nucleotide Polymorphisms in a Case-Control Study of Esophageal Cancer; a novel method
Background: Systematic evaluation and study of single nucleotide polymorphisms (SNPs) made possible by high throughput genotyping technologies and bioinformatics promises to provi...
Qian Xie, Luke D. Ratnasinghe, Huixiao Hong, Roger...