ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
Latest Publications
TOTAL DOCUMENTS
56
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
9781424437634
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Neural-based iterative approach for iris detection in iris recognition systems
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356533
◽
2009
◽
Cited By ~ 6
Author(s):
Ruggero Donida Labati
◽
Vincenzo Piuri
◽
Fabio Scotti
Keyword(s):
Iris Recognition
◽
Iterative Approach
◽
Recognition Systems
Download Full-text
Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356558
◽
2009
◽
Cited By ~ 1
Author(s):
Zhen Ding
◽
Henry Leung
Keyword(s):
Sensor Network
◽
Nonlinear Transformation
◽
Passive Sensor
Download Full-text
Tracking a moving hypothesis for visual data with explicit switch detection
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356547
◽
2009
◽
Cited By ~ 2
Author(s):
Jason Rhinelander
◽
Peter X. Liu
Keyword(s):
Visual Data
Download Full-text
Integrating reasoning with personality effects in simulated operators
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356538
◽
2009
◽
Author(s):
Ruibiao J. Guo
◽
Brad Cain
Download Full-text
Organizing committee
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356572
◽
2009
◽
Download Full-text
Multiple UAV teams for multiple tasks
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356535
◽
2009
◽
Cited By ~ 4
Author(s):
P.B. Sujit
◽
Joao Sousa
◽
Fernando Pereira
Keyword(s):
Multiple Tasks
Download Full-text
He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356530
◽
2009
◽
Cited By ~ 3
Author(s):
Jana Diesner
◽
Kathleen M. Carley
Keyword(s):
Social Network
◽
Social Network Analysis
◽
Network Analysis
◽
Relation Extraction
◽
Entity Extraction
◽
Reference Resolution
Download Full-text
Evolution and evaluation of biometric systems
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356531
◽
2009
◽
Cited By ~ 15
Author(s):
Dmitry O. Gorodnichy
Keyword(s):
Biometric Systems
Download Full-text
Machine learning based encrypted traffic classification: Identifying SSH and Skype
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356534
◽
2009
◽
Cited By ~ 66
Author(s):
Riyad Alshammari
◽
A. Nur Zincir-Heywood
Keyword(s):
Machine Learning
◽
Traffic Classification
◽
Encrypted Traffic
Download Full-text
Joint path planning and sensor subset selection for multistatic sensor networks
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
◽
10.1109/cisda.2009.5356539
◽
2009
◽
Cited By ~ 3
Author(s):
Ratnasingham Tharmarasa
◽
Thia Kirubarajan
◽
Thomas Lang
Keyword(s):
Sensor Networks
◽
Path Planning
◽
Subset Selection
◽
Selection For
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close