Sciweavers

440 search results - page 66 / 88
» A challenge for atomicity verification
Sort
View
WWW
2008
ACM
14 years 10 months ago
Linked data on the web (LDOW2008)
The Web is increasingly understood as a global information space consisting not just of linked documents, but also of Linked Data. More than just a vision, the resulting Web of Da...
Christian Bizer, Tom Heath, Kingsley Idehen, Tim B...
POPL
2005
ACM
14 years 10 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 4 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
14 years 4 months ago
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that ass...
Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger,...
ICCV
2007
IEEE
14 years 4 months ago
Hierarchical Ensemble of Global and Local Classifiers for Face Recognition
In the literature of psychophysics and neurophysiology, many studies have shown that both global and local features are crucial for face representation and recognition. This paper...
Yu Su, Shiguang Shan, Xilin Chen, Wen Gao