Robert E. Donovan
INTERSPEECH - Eurospeech 2001
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
Robert E. Donovan
INTERSPEECH - Eurospeech 2001
B. Wagle
EJOR
Lerong Cheng, Jinjun Xiong, et al.
ASP-DAC 2008
William Hinsberg, Joy Cheng, et al.
SPIE Advanced Lithography 2010