Sciweavers

496 search results - page 78 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
BVAI
2007
Springer
14 years 2 months ago
Non-invasive Brain-Actuated Interaction
The promise of Brain-Computer Interfaces (BCI) technology is to augment human capabilities by enabling interaction with computers through a conscious and spontaneous modulation of ...
José del R. Millán, Pierre W. Ferrez...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 2 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
GPC
2007
Springer
13 years 11 months ago
Image Streaming and Recognition for Vehicle Location Tracking Using Mobile Devices
The image of a license plate is scanned by the camera attached to a mobile PDA device and the numbers on the plate are detected by the image processing parts in the proposed Mobile...
Jin-Suk Kang, Taikyeong T. Jeong, Sang Hyun Oh, Me...
DRM
2003
Springer
14 years 1 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ICIP
1999
IEEE
14 years 9 months ago
Automatic Image Orientation Detection
Automatic detection and correction of image orientation is of great importance in intelligent image processing. In this paper, we present an automatic image orientation detection ...
Aditya Vailaya, HongJiang Zhang, Anil K. Jain