Sciweavers

980 search results - page 40 / 196
» Faster Possibility Detection by Combining Two Approaches
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 11 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
RAID
1999
Springer
15 years 9 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
CAISE
2006
Springer
15 years 8 months ago
Detecting Changes in Ontologies via DAG Comparison
Abstract. Ontologies are shared conceptualizations of a certain domain. As such domains may change, also changes in the ontologies have to be considered, as otherwise there is no w...
Johann Eder, Karl Wiggisser
ECCV
2002
Springer
16 years 6 months ago
Image Features Based on a New Approach to 2D Rotation Invariant Quadrature Filters
Abstract. Quadrature filters are a well known method of low-level computer vision for estimating certain properties of the signal, as there are local amplitude and local phase. How...
Michael Felsberg, Gerald Sommer
ECCV
2006
Springer
16 years 6 months ago
Human Detection Using Oriented Histograms of Flow and Appearance
Detecting humans in films and videos is a challenging problem owing to the motion of the subjects, the camera and the background and to variations in pose, appearance, clothing, il...
Navneet Dalal, Bill Triggs, Cordelia Schmid