Login / Signup
Cyberattacks: Does Physical Boundry Matter?
Qiu-Hong Wang
Seung-Hyun Kim
Published in:
ICIS (2009)
Keyphrases
</>
database
real world
learning algorithm
three dimensional
pattern recognition
databases
neural network
search engine
image processing
decision trees
case study
image segmentation
video sequences
cooperative
image retrieval