Sciweavers

173 search results - page 31 / 35
» Classification of RFID Attacks
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Real Time Lip Motion Analysis for a Person Authentication System using Near Infrared Illumination
In this paper we present an approach for lip motion analysis that can be used in conjunction with a person authentication system based on face recognition, to avoid attacks on the...
Faisal Shafait, Ralph Kricke, Islam Shdaifat, Rolf...
WWW
2005
ACM
14 years 8 months ago
Boosting SVM classifiers by ensemble
By far, the support vector machines (SVM) achieve the state-of-theart performance for the text classification (TC) tasks. Due to the complexity of the TC problems, it becomes a ch...
Yan-Shi Dong, Ke-Song Han
GRID
2005
Springer
14 years 1 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
CHI
2008
ACM
14 years 8 months ago
Aligning temporal data by sentinel events: discovering patterns in electronic health records
Electronic Health Records (EHRs) and other temporal databases contain hidden patterns that reveal important cause-and-effect phenomena. Finding these patterns is a challenge when ...
Taowei David Wang, Catherine Plaisant, Alexander J...
ADMA
2005
Springer
143views Data Mining» more  ADMA 2005»
14 years 1 months ago
A Comprehensive Benchmark of the Artificial Immune Recognition System (AIRS)
: Artificial Immune Systems are a new class of algorithms inspired by how the immune system recognizes, attacks and remembers intruders. This is a fascinating idea, but to be accep...
Lingjun Meng, Peter van der Putten, Haiyang Wang