Sciweavers

97
Voted
ICONIP
2009
15 years 11 days ago
Exchange Rate Forecasting Using Classifier Ensemble
: In this paper, we investigate the impact of the non-numerical information on exchange rate changes and that of ensemble multiple classifiers on forecasting exchange rate between ...
Zhi-Bin Wang, Hong-Wei Hao, Xu-Cheng Yin, Qian Liu...
92
Voted
ICONIP
2009
15 years 11 days ago
A Rock Structure Recognition System Using FMI Images
Formation Micro Imager (FMI) can directly reflect changes of wall stratum and rock structures. It is also an important method to divide stratum and identify lithology. However, peo...
Xu-Cheng Yin, Qian Liu, Hong-Wei Hao, Zhi-Bin Wang...
122
Voted
ICONIP
2009
15 years 11 days ago
Gender Classification Based on Support Vector Machine with Automatic Confidence
In this paper, we propose a support vector machine with automatic confidence (SVMAC) for gender classification based on facial images. Namely, we explore how to incorporate confide...
Zheng Ji, Bao-Liang Lu
140
Voted
ICISS
2009
Springer
15 years 11 days ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
114
Voted
ICISS
2009
Springer
15 years 11 days ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
119
Voted
ICISS
2009
Springer
15 years 11 days ago
On Some Weaknesses in the Disk Encryption Schemes EME and EME2
Abstract. Tweakable enciphering schemes are a certain type of blockcipher mode of operation which provide security in the sense of a strong pseudo-random permutation. It has been p...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
119
Voted
ICHIT
2009
Springer
15 years 12 days ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
94
Voted
ICEIS
2009
IEEE
15 years 12 days ago
Defining a Workflow Process for Textual and Geographic Indexing of Documents
Nieves R. Brisaboa, Ana Cerdeira-Pena, Miguel Rodr...
132
Voted
ICEIS
2009
IEEE
15 years 12 days ago
Pattern Recognition for Downhole Dynamometer Card in Oil Rod Pump System using Artificial Neural Networks
: This paper presents the development of an Artificial Neural Network system for Dynamometer Card pattern recognition in oil well rod pump systems. It covers the establishment of p...
Marco A. D. Bezerra, Leizer Schnitman, Manuel de A...