Sciweavers

252 search results - page 29 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
DAGM
2006
Springer
14 years 9 days ago
Integrating Recognition and Reconstruction for Cognitive Traffic Scene Analysis from a Moving Vehicle
This paper presents a practical system for vision-based traffic scene analysis from a moving vehicle based on a cognitive feedback loop which integrates real-time geometry estimati...
Bastian Leibe, Nico Cornelis, Kurt Cornelis, Luc J...
ACMSE
2006
ACM
14 years 2 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
MEDIAFORENSICS
2010
13 years 7 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
APSEC
2008
IEEE
14 years 3 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
ICANN
2001
Springer
14 years 1 months ago
Independent Variable Group Analysis
Humans tend to group together related properties in order to understand complex phenomena. When modeling large problems with limited representational resources, it is important to...
Krista Lagus, Esa Alhoniemi, Harri Valpola