... topics in information security research and development . The ... ideas for books under this series . Additional titles in the series ... Image and Video Encryption From Digital Rights Management to Secured Advances in Information Security.
Communications and Multimedia Security: 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
... evolution. Solution to a problem solved by genetic algorithms uses an evolutionary process (it is evolved). The algorithm starts ... package from the North Carolina State University with their default settings for floatGA [HJK95]. The options ...
Parallel Computation: 4th International ACPC Conference Including Special Tracks on Parallel Numerics (ParNum'99) and Parallel Computing in Image Processing, Video Processing, and Multimedia Salzburg, Austria, February 16-18, 1999, Proceedings
... cube given the points (x0,y0), (x1,y1), , ( xN-1,yN-1) and value x, where N=kn, let each processing node have four registers, R1, R2, R3 and R4. Registers R1 and R2, are used to compute terms required for evaluating Lagrange polynomial ...
Computer Assisted and Robotic Endoscopy and Clinical Image-Based Procedures: 4th International Workshop, CARE 2017, and 6th International Workshop, CLIP 2017, Held in Conjunction with MICCAI 2017, Québec City, QC, Canada, September 14, 2017, Proceedings
... Ángel González Ballester, Jonathan McLeod, Klaus Drechsler, Terry Peters, Marius Erdt, Kensaku Mori, Marius George ... decay of 5e–8. Adam, a gradient-based optimization method similar to stochastic gradient descent proposed in [17] ...
... biometric presentation attack detection—part 3: testing and reporting [39], which will be used throughout the chapter: • Bona fide presentation: “interaction of the biometric capture subject and the biometric data capture subsystem in ...
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings
... NFDUMP, http://nfdump.sourceforge.net 10. 11. Haag, P.: NfSen, http://nfsen.sourceforge.net Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: Proc. of the 2005 Conference on Applications ...
This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.