default search action
CISDA 2012: Ottawa, Canada
- 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, CISDA 2012, Ottawa, Canada, July 11-13, 2012. IEEE 2012, ISBN 978-1-4673-1417-6
Applications in Biometrics and Video Surveillance
- Joseph Shelton, Joshua Adams, Aniesha Alford, Melissa A. Venable, Sabra Neal, Gerry V. Dozier, Kelvin S. Bryant:
Mitigating replay attacks using Darwinian-based Feature Extraction. 1-7 - Pak-Ming Cheung, Kam-Tim Woo:
MCMC-based human tracking with stereo cameras under frequent interaction and occlusion. 1-8 - Rene Golembewski, Günter Schäfer, Tobias Gerlach:
Efficient communication for large-scale robust image processing with smart camera devices. 1-8 - Nassirou Lo, Jean Berger, Martin Noël:
Toward optimizing static target search path planning. 1-7 - Beining Huang, Shilei Liu, Wenxin Li:
A finger posture change correction method for finger-vein recognition. 1-7
Biometric Technologies, Systems and Applications
- Miguel De-la-Torre, Paulo Vinicius Wolski Radtke, Eric Granger, Robert Sabourin, Dmitry O. Gorodnichy:
A comparison of adaptive matchers for screening of faces in video surveillance. 1-8 - Amal Dandashi, Walid Karam:
Biometrics security and experiments on face recognition algorithms. 1-8 - David Bissessar, Dmitry O. Gorodnichy, Alex Stoianov, Michael Thieme:
Assessment of privacy enhancing technologies for biometrics. 1-9 - Xiaozhao Fang, Yong Xu:
Combine the clustering algorithm and representation-based algorithm for concurrent classification of test samples. 1-5 - Fawaz A. Alsulaiman, Julio J. Valdés, Abdulmotaleb El-Saddik:
Identity verification based on haptic handwritten signatures: Genetic programming with unbalanced data. 1-7
Special Session: Autonomy for Unmanned Systems, Computers and Sensor Networks
- Soheil Keshmiri, Shahram Payandeh:
Cooperation through mediation in multi-robot pursuit games. 1-8 - Stéphane Blouin:
Managing data latency for consensus over dynamic sensor-networks. 1-7 - Akhan Almagambetov, Mauricio Casares, Senem Velipasalar:
Autonomous tracking of vehicle rear lights and detection of brakes and turn signals. 1-7
Special Session: Security Issues in Emerging Network Technologies
- Raghav V. Sampangi, Srinivas Sampalli:
Tag-server mutual authentication scheme based on gene transfer and genetic mutation. 1-8 - Haopeng Zhang, Zhenyi Liu, Qing Hui:
Optimal defense synthesis for jamming attacks in cognitive radio networks via swarm optimization. 1-8 - Ambica Pawan Khandavilli, Musfiq Rahman, Srinivas Sampalli:
A mobile role-based access control system using identity-based encryption with zero knowledge proof. 1-7
Sensor Cueing, Tasking and Fusion
- Rafael Falcón, Amiya Nayak, Rami S. Abielmona:
An online shadowed clustering algorithm applied to risk visualization in Territorial Security. 1-8 - Derek T. Anderson, Ozy Sjahputera, Kevin E. Stone, James M. Keller:
Causal cueing system for above ground anomaly detection of explosive hazards using support vector machine localized by K-nearest neighbor. 1-8 - Zixing Cai, Yi Li, Mingqin Gu:
Real-time recognition system of traffic light in urban environment. 1-6 - Shiven Sharma, Colin Bellinger, Nathalie Japkowicz, Rodney Berg, R. Kurt Ungar:
Anomaly detection in gamma ray spectra: A machine learning perspective. 1-8
Special Session: Computational Intelligence and Social Media
- Hwei-Ming Ying, Vrizlynn L. L. Thing:
An enhanced intelligent forum crawler. 1-8 - Marine Carpuat, Cyril Goutte, Pierre Isabelle:
Filtering and routing multilingual documents for translation. 1-7 - Xiaodan Zhu:
Spotting keywords and sensing topic changes in speech. 1-7 - Fan Yang, Qinru Qiu, Morgan Bishop, Qing Wu:
Tag-assisted sentence confabulation for intelligent text recognition. 1-7
Stategic and Tactical Planning
- Mark Rempel:
Visualizing capability requirements in planning scenarios using Principal Component Analysis. 1-8 - Soheil Keshmiri, Shahram Payandeh:
Cooperative dynamic task-allocation through iterative agents' costs permutations. 1-8 - Eric Torunski:
Cloud-based collaborative creation and simulation of courses of action: Creation of a prototype web application using new HTML5 features. 1-6
Adaptive Methodologies for Pattern Recognition
- Mihail Popescu, Alex Paino, Kevin E. Stone, James M. Keller:
Detection of buried objects in FLIR imaging using mathematical morphology and SVM. 1-5 - Myriam Abramson:
Toward the attribution of Web behavior. 1-5 - David B. Lewis, James M. Keller, Mihail Popescu, Kevin E. Stone:
Dirt road segmentation using color and texture features in color imagery. 1-6
Adaptive Methodologies for Pattern Recognition
- Shengkun Xie, Sridhar Krishnan, Anna T. Lawniczak:
Analysis of communication network surveillance using functional ANOVA model with unequal variances. 1-6 - Raphaël Khoury, Abdelwahab Hamou-Lhadj, Mario Couture:
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security. 1-7 - Guangye Sui, Mohamed Mejri, Hatem Ben Sta:
FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.