Sciweavers

418 search results - page 48 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
IBPRIA
2007
Springer
14 years 2 months ago
A Neural Network Model for Image Change Detection Based on Fuzzy Cognitive Maps
This paper outlines a neural network model based on the Fuzzy Cognitive Maps (FCM) framework for solving the automatic image change detection problem. Each pixel in the reference i...
Gonzalo Pajares, Alfonso Sánchez-Beato, Jes...
DRR
2009
13 years 5 months ago
Combination of dynamic Bayesian network classifiers for the recognition of degraded characters
We investigate in this paper the combination of DBN (Dynamic Bayesian Network) classifiers, either independent or coupled, for the recognition of degraded characters. The independ...
Laurence Likforman-Sulem, Marc Sigelle
AUSFORENSICS
2004
13 years 9 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
ICS
2010
Tsinghua U.
14 years 22 days ago
Small-ruleset regular expression matching on GPGPUs: quantitative performance analysis and optimization
We explore the intersection between an emerging class of architectures and a prominent workload: GPGPUs (General-Purpose Graphics Processing Units) and regular expression matching...
Jamin Naghmouchi, Daniele Paolo Scarpazza, Mladen ...
WPES
2003
ACM
14 years 1 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett