Sciweavers

3031 search results - page 204 / 607
» Reuse in the application layer
Sort
View
JNW
2006
142views more  JNW 2006»
15 years 4 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
WEBI
2010
Springer
15 years 2 months ago
Image Set Classification Using Multi-layer Multiple Instance Learning with Application to Cannabis Website Classification
We propose using multi-layer multiple instance learning (MMIL) for image set classification and applying it to the task of cannabis website classification. We treat each image as a...
Nianhua Xie, Haibin Ling, Weiming Hu
ICANN
2009
Springer
15 years 2 months ago
Mental Tasks Classification for a Noninvasive BCI Application
Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for...
Alexandre Ormiga G. Barbosa, David Ronald A. Diaz,...
CVPR
2011
IEEE
15 years 24 days ago
On Deep Generative Models with Applications to Recognition
The most popular way to use probabilistic models in vision is first to extract some descriptors of small image patches or object parts using well-engineered features, and then to...
Marc', Aurelio Ranzato, Joshua Susskind, Volodymyr...
COLCOM
2005
IEEE
15 years 10 months ago
The Nizza secure-system architecture
The trusted computing bases (TCBs) of applications running on today’s commodity operating systems have become extremely large. This paper presents an architecture that allows to...
Hermann Härtig, Michael Hohmuth, Norman Feske...