Sciweavers

3193 search results - page 535 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
CSREASAM
2008
13 years 11 months ago
3D Face Recognition for Unattended Border Control
Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 on...
Christoph Busch, Alexander Nouak
PERCOM
2007
ACM
14 years 10 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...
CISS
2010
IEEE
13 years 1 months ago
Concentration of measure for block diagonal matrices with repeated blocks
Abstract—The theoretical analysis of randomized compressive operators often relies on the existence of a concentration of measure inequality for the operator of interest. Though ...
Christopher J. Rozell, Han Lun Yap, Jae Young Park...
ACMDIS
2010
ACM
13 years 10 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
WWW
2005
ACM
14 years 11 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani