default search action
1. BLISS 2007: Edingburgh, Scotland, UK
- Adrian Stoica, Tughrul Arslan, Daniel Howard, Tai-Hoon Kim, Ahmed O. El-Rayis:
2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007, Edinburgh, United Kingdom, 9-10 August 2007. IEEE Computer Society 2007, ISBN 0-7695-2919-4
Biometrics
- Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark Robinson, Colin Tredoux, Jo Park, Alex H. McIntyre, Peter J. B. Hancock:
Evolving the Face of a Criminal: How to Search a Face Space More Effectively. 3-10 - Vlad P. Shmerko, Svetlana N. Yanushkevich, Hyunsuk Moon, Adrian Stoica, Ronald R. Yager:
Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures. 11-14 - Khalil Zebbiche, Fouad Khelifi, Ahmed Bouridane:
Maximum-Likelihood Watermarking Detection on Fingerprint Images. 15-18 - Martin Drahanský:
Sinusoidal Shape of a Papillary Line Crosscut. 19-24
Cyber Security
- Tai-Hoon Kim, Seoksoo Kim, Gilcheol Park:
Block Model Application for Decision Support Systems. 25-28 - Hak-Man Kim, Dong-Joo Kang, Tai-Hoon Kim:
Flexible Key Distribution for SCADA Network using Multi-Agent System. 29-34 - Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. 35-40 - Youngho Park, Won-Young Lee, Kyung Hyune Rhee:
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. 41-46 - Haeng-Kon Kim:
Frameworks of Indexing Mechanism for Mobile Devices. 47-50 - Wenmao Zhang, Jun Bi, Jianping Wu, Zheng Qin:
An Approach to Optimize Local Trust Algorithm in SureMsg Service. 51-54 - Sang-Soo Yeo, Kouichi Sakurai, Jin Kwak:
A Practical Proxy Device for Protecting RFID Tag's Identifier. 55-58 - Kun Lin, Lin Yuan, Gang Qu:
SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction. 59-64
Sensor Networks
- Siti Yuhaniz, Tanya Vladimirova, Scott Gleason:
An Intelligent Decision-Making System for Flood Monitoring from Space. 65-71 - Erfu Yang, Ahmet T. Erdogan, Tughrul Arslan, Nick Barton:
Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints. 72-75 - Erfu Yang, Ahmet T. Erdogan, Tughrul Arslan, Nick Barton:
An Improved Particle Swarm Optimization Algorithm for Power-Efficient Wireless Sensor Networks. 76-82
Adaptive Technqiues for Security
- Nikolaos G. Bartzoudis, Klaus D. McDonald-Maier:
An adaptive processing node architecture for validating sensors reliability in a wind farm. 83-86 - Jim Tørresen, Kyrre Glette:
Making Hardware Soft in Intelligent Systems. 87-90 - H. J. Kadim:
Modelling of Anticipatory Behaviour for Self-Control and Adaptability with Applications to Autonomous Systems. 91-96
Image and Signal Processing Techniques
- Daniel Howard, Joseph Kolibal:
Image Analysis by Means of the Stochastic Matrix Method of Function Recovery. 97-101 - Oana Muntean, Mihai Oltean:
Processing Bank Checks with Genetic Programming and Histograms. 102-105 - Walid Riad Boukabou, Ahmed Bouridane:
An Improved LDA Approach with DFB Preprocessing for Face Recognition. 106-110 - Konstantinos Sirlantzis, W. Gareth J. Howells, Toby Lloyd-Jones, Michael C. Fairhurst:
A Multi-Classifier Approach to Modelling Human and Automatic Visual Cognition. 111-114 - W. Gareth J. Howells, Klaus D. McDonald-Maier, T. Binzegger, M. P. Young:
MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System. 115-118 - Turgay Temel, Nizamettin Aydin:
A Threshold Free Clustering Algorithm for Robust Unsupervised Classification. 119-122
Emerging Areas in Security Research
- A. Ian Thompson, Ahmed Bouridane, Fatih Kurugollu:
Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Domain. 123-132 - Wael Adi, Bassel Soudan:
Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. 133-136 - Andrew B. T. Hopkins, Klaus D. McDonald-Maier, W. Gareth J. Howells, Ahmet T. Erdogan, Tughrul Arslan:
I2S3 the Integrated Intelligent Secure Sensor Systems Project. 137-140 - Lukás Sekanina, Tomas Hruska, Tomás Vojnar, Dusan Kolár, Jan Cernocký:
On Some Directions in Security-Oriented Research. 141-144 - Mircea Gh. Negoita:
Artificial Immune Systems -- an Emergent Technology Performing the Defence of Complex Systems. 145-150
Biological, Chemical, and Medical Applications
- Sue Ellen Haupt, Randy L. Haupt, George S. Young:
Using Genetic Algorithms in Chem-Bio Defense Applications. 151-154 - H. J. Kadim, Christopher M. Wood:
Prediction of Protein Conformation with Potential Applications to Medical Diagnosis and Defence. 155-158 - Adem Karahoca, Turkalp Kucur, Nizamettin Aydin:
Data Mining Usage in Emboli Detection. 159-162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.