Sciweavers

211 search results - page 7 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
ICDAR
2011
IEEE
12 years 8 months ago
Towards Searchable Digital Urdu Libraries - A Word Spotting Based Retrieval Approach
—Libraries in South Asia hold huge collections of valuable printed documents in Urdu and it is of interest to digitize these collections to make them more accessible. The unavail...
Ali Abidi, Imran Siddiqi, Khurram Khurshid
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
SCIA
2005
Springer
211views Image Analysis» more  SCIA 2005»
14 years 2 months ago
Perception-Action Based Object Detection from Local Descriptor Combination and Reinforcement Learning
This work proposes to learn visual encodings of attention patterns that enables sequential attention for object detection in real world environments. The system embeds a saccadic d...
Lucas Paletta, Gerald Fritz, Christin Seifert
CIKM
2006
Springer
14 years 9 days ago
Multi-evidence, multi-criteria, lazy associative document classification
We present a novel approach for classifying documents that combines different pieces of evidence (e.g., textual features of documents, links, and citations) transparently, through...
Adriano Veloso, Wagner Meira Jr., Marco Cristo, Ma...
ICPADS
2007
IEEE
14 years 2 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies