Sign in

Introducing "Insecure IT".

Rick KuhnHart RossmanSimon Liu
Published in: IT Prof. (2009)
Keyphrases
  • authentication scheme
  • data sets
  • databases
  • feature selection
  • image sequences
  • data structure
  • multiresolution
  • response time