Sciweavers

15379 search results - page 156 / 3076
» Protecting users from
Sort
View
GECCO
2007
Springer
176views Optimization» more  GECCO 2007»
14 years 2 months ago
The effect of learning on life history evolution
A series of evolutionary neural network simulations are presented which explore the hypothesis that learning factors can result in the evolution of long periods of parental protec...
John A. Bullinaria
CISSE
2008
Springer
13 years 10 months ago
IraqComm and FlexTrans: A Speech Translation System and Flexible Framework
SRI International's IraqComm system performs bidirectional speech-to-speech machine translation between English and Iraqi Arabic in the domains of force protection, municipal ...
Michael W. Frandsen, Susanne Riehemann, Kristin Pr...
MEDIAFORENSICS
2010
13 years 6 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
SIGSOFT
2008
ACM
14 years 8 months ago
Profile-guided program simplification for effective testing and analysis
Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are oft...
Lingxiao Jiang, Zhendong Su
CCS
2009
ACM
14 years 2 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...