Sciweavers

1737 search results - page 45 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NN
2002
Springer
114views Neural Networks» more  NN 2002»
13 years 8 months ago
Learning the parts of objects by auto-association
Recognition-by-components is one of the possible strategies proposed for object recognition by the brain, but little is known about the low-level mechanism by which the parts of o...
Xijin Ge, Shuichi Iwata
ICSM
2002
IEEE
14 years 2 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
IJCNN
2007
IEEE
14 years 3 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...
IH
2005
Springer
14 years 2 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
IJON
2010
129views more  IJON 2010»
13 years 7 months ago
Robust object tracking using a spatial pyramid heat kernel structural information representation
In this paper, we propose an object tracking framework based on a spatial pyramid heat kernel structural information representation. In the tracking framework, we take advantage o...
Xi Li, Weiming Hu, Hanzi Wang, Zhongfei Zhang