Sciweavers

6153 search results - page 1058 / 1231
» Modeling Cyclic Change
Sort
View
IVC
2007
266views more  IVC 2007»
13 years 8 months ago
Face detection and facial feature localization without considering the appearance of image context
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Effi...
Suphakant Phimoltares, Chidchanok Lursinsap, Kosin...
JCC
2007
80views more  JCC 2007»
13 years 8 months ago
In between worlds: G.N. Lewis, the shared pair bond and its multifarious contexts
: In this paper, I will look at the rather convoluted discovery process which gave birth to the concept of the shared electron pair bond as developed by G.N. Lewis, to be subsequen...
Ana Simões
JCM
2007
143views more  JCM 2007»
13 years 8 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JCP
2007
132views more  JCP 2007»
13 years 8 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
JCP
2007
127views more  JCP 2007»
13 years 8 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
« Prev « First page 1058 / 1231 Last » Next »