Hans Becker, Frank Schmidt, et al.
Photomask and Next-Generation Lithography Mask Technology 2004
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
Hans Becker, Frank Schmidt, et al.
Photomask and Next-Generation Lithography Mask Technology 2004
Raghu Krishnapuram, Krishna Kummamuru
IFSA 2003
Minkyong Kim, Zhen Liu, et al.
INFOCOM 2008
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996