Sciweavers

1414 search results - page 25 / 283
» Combining Intruder Theories
Sort
View
IPMU
2010
Springer
13 years 11 months ago
Evidential Combination of Multiple HMM Classifiers for Multi-script Handwritting Recognition
In this work, we focus on an improvement of a multi-script handwritting recognition system using a HMM based classifiers combination. The improvement relies on the use of Dempster-...
Yousri Kessentini, Thomas Burger, Thierry Paquet
KR
1998
Springer
14 years 2 months ago
Combining Narratives
A theory is elaboration tolerant to the extent that new information can be incorporated with only simple changes. The simplest change is conjoining new information, and only conju...
John McCarthy, Tom Costello
AINA
2007
IEEE
14 years 4 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
ISSA
2008
13 years 11 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
IDEAL
2010
Springer
13 years 7 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...