


default search action
CISDA 2012: Ottawa, Canada
- 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, CISDA 2012, Ottawa, Canada, July 11-13, 2012. IEEE 2012, ISBN 978-1-4673-1417-6

Applications in Biometrics and Video Surveillance
- Joseph Shelton

, Joshua Adams, Aniesha Alford, Melissa A. Venable, Sabra Neal, Gerry V. Dozier, Kelvin S. Bryant:
Mitigating replay attacks using Darwinian-based Feature Extraction. 1-7 - Pak-Ming Cheung, Kam-Tim Woo:

MCMC-based human tracking with stereo cameras under frequent interaction and occlusion. 1-8 - Rene Golembewski, Günter Schäfer, Tobias Gerlach

:
Efficient communication for large-scale robust image processing with smart camera devices. 1-8 - Nassirou Lo, Jean Berger, Martin Noël:

Toward optimizing static target search path planning. 1-7 - Beining Huang, Shilei Liu, Wenxin Li:

A finger posture change correction method for finger-vein recognition. 1-7
Biometric Technologies, Systems and Applications
- Miguel De-la-Torre

, Paulo Vinicius Wolski Radtke, Eric Granger
, Robert Sabourin, Dmitry O. Gorodnichy:
A comparison of adaptive matchers for screening of faces in video surveillance. 1-8 - Amal Dandashi, Walid Karam:

Biometrics security and experiments on face recognition algorithms. 1-8 - David Bissessar, Dmitry O. Gorodnichy, Alex Stoianov, Michael Thieme:

Assessment of privacy enhancing technologies for biometrics. 1-9 - Xiaozhao Fang, Yong Xu:

Combine the clustering algorithm and representation-based algorithm for concurrent classification of test samples. 1-5 - Fawaz A. Alsulaiman

, Julio J. Valdés, Abdulmotaleb El-Saddik
:
Identity verification based on haptic handwritten signatures: Genetic programming with unbalanced data. 1-7
Special Session: Autonomy for Unmanned Systems, Computers and Sensor Networks
- Soheil Keshmiri, Shahram Payandeh:

Cooperation through mediation in multi-robot pursuit games. 1-8 - Stéphane Blouin:

Managing data latency for consensus over dynamic sensor-networks. 1-7 - Akhan Almagambetov

, Mauricio Casares, Senem Velipasalar:
Autonomous tracking of vehicle rear lights and detection of brakes and turn signals. 1-7
Special Session: Security Issues in Emerging Network Technologies
- Raghav V. Sampangi, Srinivas Sampalli:

Tag-server mutual authentication scheme based on gene transfer and genetic mutation. 1-8 - Haopeng Zhang

, Zhenyi Liu, Qing Hui:
Optimal defense synthesis for jamming attacks in cognitive radio networks via swarm optimization. 1-8 - Ambica Pawan Khandavilli, Musfiq Rahman, Srinivas Sampalli:

A mobile role-based access control system using identity-based encryption with zero knowledge proof. 1-7
Sensor Cueing, Tasking and Fusion
- Rafael Falcón, Amiya Nayak

, Rami S. Abielmona:
An online shadowed clustering algorithm applied to risk visualization in Territorial Security. 1-8 - Derek T. Anderson, Ozy Sjahputera, Kevin E. Stone, James M. Keller:

Causal cueing system for above ground anomaly detection of explosive hazards using support vector machine localized by K-nearest neighbor. 1-8 - Zixing Cai, Yi Li, Mingqin Gu:

Real-time recognition system of traffic light in urban environment. 1-6 - Shiven Sharma, Colin Bellinger, Nathalie Japkowicz

, Rodney Berg, R. Kurt Ungar:
Anomaly detection in gamma ray spectra: A machine learning perspective. 1-8
Special Session: Computational Intelligence and Social Media
- Hwei-Ming Ying, Vrizlynn L. L. Thing:

An enhanced intelligent forum crawler. 1-8 - Marine Carpuat, Cyril Goutte, Pierre Isabelle:

Filtering and routing multilingual documents for translation. 1-7 - Xiaodan Zhu:

Spotting keywords and sensing topic changes in speech. 1-7 - Fan Yang, Qinru Qiu, Morgan Bishop, Qing Wu:

Tag-assisted sentence confabulation for intelligent text recognition. 1-7
Stategic and Tactical Planning
- Mark Rempel

:
Visualizing capability requirements in planning scenarios using Principal Component Analysis. 1-8 - Soheil Keshmiri, Shahram Payandeh:

Cooperative dynamic task-allocation through iterative agents' costs permutations. 1-8 - Eric Torunski:

Cloud-based collaborative creation and simulation of courses of action: Creation of a prototype web application using new HTML5 features. 1-6
Adaptive Methodologies for Pattern Recognition
- Mihail Popescu, Alex Paino, Kevin E. Stone, James M. Keller:

Detection of buried objects in FLIR imaging using mathematical morphology and SVM. 1-5 - Myriam Abramson:

Toward the attribution of Web behavior. 1-5 - David B. Lewis, James M. Keller, Mihail Popescu

, Kevin E. Stone:
Dirt road segmentation using color and texture features in color imagery. 1-6
Adaptive Methodologies for Pattern Recognition
- Shengkun Xie

, Sridhar Krishnan
, Anna T. Lawniczak
:
Analysis of communication network surveillance using functional ANOVA model with unequal variances. 1-6 - Raphaël Khoury, Abdelwahab Hamou-Lhadj

, Mario Couture:
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security. 1-7 - Guangye Sui, Mohamed Mejri, Hatem Ben Sta:

FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














