Abstract is missing.
- Effecting an Improvement to the Fitness Function. How to Evolve a More Identifiable FaceCharlie D. Frowd, Joanne Park, Alex H. McIntyre, Vicki Bruce, Melanie Pitchford, Steve Fields, Mary Kenirons, Peter J. B. Hancock. 3-10 [doi]
- Biometric-Based Decision Support Assistance in Physical Access Control SystemsS. Chague, B. Droit, Oleg Boulanov, Svetlana N. Yanushkevich, Vlad P. Shmerko, Adrian Stoica. 11-16 [doi]
- Evaluating Biometric Encryption Key Generation Using Handwritten SignaturesSanaul Hoque, Michael C. Fairhurst, W. Gareth J. Howells. 17-22 [doi]
- CHLAC Approach to Flexible and Intelligent Vision SystemsNobuyuki Otsu. 23-33 [doi]
- Development of Software for Real-Time Unusual Motions Detection by Using CHLACKenji Iwata, Yutaka Satoh, Katsuhiko Sakaue, Takumi Kobayashi, Nobuyuki Otsu. 34-39 [doi]
- HLAC Approach to Automatic Object CountingTakumi Kobayashi, Tadaaki Hosaka, Shu Mimura, Takashi Hayashi, Nobuyuki Otsu. 40-45 [doi]
- Object Detection by Selective Integration of HLAC Mask FeaturesAkinori Hidaka, Takio Kurita, Nobuyuki Otsu. 46-50 [doi]
- Motion Recognition by Higher Order Local Auto Correlation Features of Motion History ImagesKenji Watanabe, Takio Kurita. 51-55 [doi]
- The Cow Gait Recognition Using CHLACShu Mimura, Keichi Itoh, Takumi Kobayashi, Tomohiro Takigawa, Atsushi Tajima, Atsushi Sawamura, Nobuyuki Otsu. 56-57 [doi]
- Using a Cognitive Architecture to Automate Cyberdefense ReasoningD. Paul Benjamin, Partha Pratim Pal, Franklin Webber, Paul Rubel, Mike Atigetchi. 58-63 [doi]
- Network Intrusion Detection by Using Cellular Neural Network with Tabu SearchZhongxue Yang, Adem Karahoca, Ning Yang, Nizamettin Aydin. 64-68 [doi]
- Fuzzy Vault Fingerprint Smartcard Implementation Using an Orientation-Based Feature VectorKarl Harmer, Weiguo Sheng, W. Gareth J. Howells, Michael C. Fairhurst, Farzin Deravi. 69-74 [doi]
- Detecting Voltage Glitch Attacks on Secure DevicesAsier Goikoetxea Yanci, Stephen Pickles, Tughrul Arslan. 75-80 [doi]
- Towards Embedded Artificial Intelligence Based Security for Computer SystemsAndrew B. T. Hopkins, P. Sartain, Klaus D. McDonald-Maier, W. Gareth J. Howells. 81-86 [doi]
- Effects of Feature Trimming on Encryption Key Stability for an ICmetric SystemEvangelos Papoutsis, W. Gareth J. Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier. 87-91 [doi]
- Tamper Protection for Security DevicesPhilip Paul, Simon Moore, Simon Tam. 92-96 [doi]
- Analytical Modelling: An Investigation into the Use of Smart Biosensors as Stealth CountermeasuresH. J. Kadim. 97-100 [doi]
- Partially Observable Markov Decision Process for Transmitter Power Control in Wireless Sensor NetworksAdrian Udenze, Klaus D. McDonald-Maier. 101-106 [doi]
- High-Level Functional Architecture for Sensor Management SystemIsabella Panella. 107-110 [doi]
- Artificial Intelligence Methodologies Applicable to Support the Decision-Making Capability on Board Unmanned Aerial VehiclesIsabella Panella. 111-118 [doi]
- WLAN for Earth Observation Satellite Formations in LEOTanya Vladimirova, Kawsu Sidibeh. 119-124 [doi]
- Towards Recognition of Humans and their Behaviors from Space and Airborne Platforms: Extracting the Information in the Dynamics of Human ShadowsAdrian Stoica. 125-128 [doi]
- Stochastic Interpolation: A Probabilistic ViewJoseph Kolibal, Daniel Howard. 129-135 [doi]
- A Securable Autonomous Generalised Document Model (SAGENT)Gareth Howells, Hossam Selim, Michael C. Fairhurst, Farzin Deravi, Sanaul Hoque. 136-141 [doi]
- Granular Association AnalysisYun Shen, Trevor P. Martin. 142-147 [doi]
- Clone-Resistant DNA-Like Secured Dynamic IdentityWael Adi. 148-153 [doi]
- The Re-emission Side ChannelAndrew Burnside, Ahmet T. Erdogan, Tughrul Arslan. 154-159 [doi]