Sciweavers

5435 search results - page 1047 / 1087
» Informed Detection Revisited
Sort
View
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 1 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 1 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
IDEAL
2009
Springer
14 years 1 months ago
Web Feed Clustering and Tagging Aggregator Using Topological Tree-Based Self-Organizing Maps
With the rapid and dramatic increase in web feeds published by different publishers, providers or websites via Really Simple Syndication (RSS) and Atom, users cannot be expected t...
Richard T. Freeman
WIA
2001
Springer
14 years 28 days ago
Finite-State Transducer Cascade to Extract Proper Names in Texts
This article describes a finite-state cascade for the extraction of person names in texts in French. We extract these proper names in order to categorize and to cluster texts with...
Nathalie Friburger, Denis Maurel
NPAR
2000
ACM
14 years 26 days ago
Stylized rendering techniques for scalable real-time 3D animation
Researchers in nonphotorealistic rendering (NPR) have investigated a variety of techniques to simulate the styles of artists. Recent work has resulted in methods for pen-and-ink i...
Adam Lake, Carl Marshall, Mark Harris, Marc Blacks...
« Prev « First page 1047 / 1087 Last » Next »