Abstract is missing.
- An online shadowed clustering algorithm applied to risk visualization in Territorial SecurityRafael Falcón, Amiya Nayak, Rami S. Abielmona. 1-8 [doi]
- Combine the clustering algorithm and representation-based algorithm for concurrent classification of test samplesXiaozhao Fang, Yong Xu. 1-5 [doi]
- Real-time recognition system of traffic light in urban environmentZixing Cai, Yi Li, Mingqin Gu. 1-6 [doi]
- Anomaly detection in gamma ray spectra: A machine learning perspectiveShiven Sharma, Colin Bellinger, Nathalie Japkowicz, Rodney Berg, R. Kurt Ungar. 1-8 [doi]
- Cooperative dynamic task-allocation through iterative agents' costs permutationsSoheil Keshmiri, Shahram Payandeh. 1-8 [doi]
- Biometrics security and experiments on face recognition algorithmsAmal Dandashi, Walid Karam. 1-8 [doi]
- A mobile role-based access control system using identity-based encryption with zero knowledge proofAmbica Pawan Khandavilli, Musfiq Rahman, Srinivas Sampalli. 1-7 [doi]
- MCMC-based human tracking with stereo cameras under frequent interaction and occlusionPak-Ming Cheung, Kam-Tim Woo. 1-8 [doi]
- Filtering and routing multilingual documents for translationMarine Carpuat, Cyril Goutte, Pierre Isabelle. 1-7 [doi]
- Toward the attribution of Web behaviorMyriam Abramson. 1-5 [doi]
- A finger posture change correction method for finger-vein recognitionBeining Huang, Shilei Liu, Wenxin Li. 1-7 [doi]
- Cooperation through mediation in multi-robot pursuit gamesSoheil Keshmiri, Shahram Payandeh. 1-8 [doi]
- Spotting keywords and sensing topic changes in speechXiaodan Zhu. 1-7 [doi]
- Dirt road segmentation using color and texture features in color imageryDavid B. Lewis, James M. Keller, Mihail Popescu, Kevin E. Stone. 1-6 [doi]
- Visualizing capability requirements in planning scenarios using Principal Component AnalysisMark Rempel. 1-8 [doi]
- Detection of buried objects in FLIR imaging using mathematical morphology and SVMMihail Popescu, Alex Paino, Kevin E. Stone, James M. Keller. 1-5 [doi]
- Optimal defense synthesis for jamming attacks in cognitive radio networks via swarm optimizationHaopeng Zhang, Zhenyi Liu, Qing Hui. 1-8 [doi]
- Toward optimizing static target search path planningNassirou Lo, Jean Berger, Martin Noël. 1-7 [doi]
- Managing data latency for consensus over dynamic sensor-networksStephane Blouin. 1-7 [doi]
- Efficient communication for large-scale robust image processing with smart camera devicesRene Golembewski, Günter Schäfer, Tobias Gerlach. 1-8 [doi]
- A comparison of adaptive matchers for screening of faces in video surveillanceMiguel De-la-Torre, Paulo Vinicius Wolski Radtke, Eric Granger, Robert Sabourin, Dmitry O. Gorodnichy. 1-8 [doi]
- Tag-server mutual authentication scheme based on gene transfer and genetic mutationRaghav V. Sampangi, Srinivas Sampalli. 1-8 [doi]
- Mitigating replay attacks using Darwinian-based Feature ExtractionJoseph Shelton, Joshua Adams, Aniesha Alford, Melissa Venable, Sabra Neal, Gerry V. Dozier, Kelvin S. Bryant. 1-7 [doi]
- Tag-assisted sentence confabulation for intelligent text recognitionFan Yang, Qinru Qiu, Morgan Bishop, Qing Wu. 1-7 [doi]
- Towards a formal framework for evaluating the effectiveness of system diversity when applied to securityRaphael Khoury, Abdelwahab Hamou-Lhadj, Mario Couture. 1-7 [doi]
- Analysis of communication network surveillance using functional ANOVA model with unequal variancesShengkun Xie, Sridhar Krishnan, Anna T. Lawniczak. 1-6 [doi]
- Cloud-based collaborative creation and simulation of courses of action: Creation of a prototype web application using new HTML5 featuresEric Torunski. 1-6 [doi]
- An enhanced intelligent forum crawlerHwei-Ming Ying, Vrizlynn L. L. Thing. 1-8 [doi]
- Causal cueing system for above ground anomaly detection of explosive hazards using support vector machine localized by K-nearest neighborDerek T. Anderson, Ozy Sjahputera, Kevin E. Stone, James M. Keller. 1-8 [doi]
- Assessment of privacy enhancing technologies for biometricsDavid Bissessar, Dmitry O. Gorodnichy, Alex Stoianov, Michael Thieme. 1-9 [doi]
- Autonomous tracking of vehicle rear lights and detection of brakes and turn signalsAkhan Almagambetov, Mauricio Casares, Senem Velipasalar. 1-7 [doi]
- Identity verification based on haptic handwritten signatures: Genetic programming with unbalanced dataFawaz A. Alsulaiman, Julio J. Valdés, Abdulmotaleb El-Saddik. 1-7 [doi]
- FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approachGuangye Sui, Mohamed Mejri, Hatem Ben Sta. 1-8 [doi]