Sciweavers

4307 search results - page 654 / 862
» Dynamic Spyware Analysis
Sort
View
CSFW
2003
IEEE
14 years 3 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
ICDAR
2003
IEEE
14 years 3 months ago
A Study on Top-down Word Image Generation for Handwritten Word Recognition
This paper describes a top-down word image generation model for holistic handwritten word recognition. To generate a word image, it uses likelihoods based, respectively, on a ling...
Eiki Ishidera, Daisuke Nishiwaki
ICDAR
2003
IEEE
14 years 3 months ago
Recovery of Writing Sequence of Static Images of Handwriting using UWM
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing...
Kai Kwong Lau, Pong Chi Yuen, Yuan Yan Tang
ICDAR
2003
IEEE
14 years 3 months ago
Features for Word Spotting in Historical Manuscripts
For the transition from traditional to digital libraries, the large number of handwritten manuscripts that exist pose a great challenge. Easy access to such collections requires a...
Toni M. Rath, R. Manmatha
DSOM
2003
Springer
14 years 3 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...