Sciweavers

546 search results - page 70 / 110
» About Face
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 4 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
ECML
2005
Springer
14 years 4 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
ECAI
2004
Springer
14 years 4 months ago
The Use of Temporal Reasoning and Management of Complex Events in Smart Homes
Technological advancements have and will revolutionise the support offered to persons in their home environment. As the population continues to grow and in addition the percentage ...
Juan Carlos Augusto, Chris D. Nugent
ICBA
2004
Springer
105views Biometrics» more  ICBA 2004»
14 years 4 months ago
Soft Biometric Traits for Personal Recognition Systems
Many existing biometric systems collect ancillary information like gender, age, height, and eye color from the users during enrollment. However, only the primary biometric identiï¬...
Anil K. Jain, Sarat C. Dass, Karthik Nandakumar
POLICY
2004
Springer
14 years 4 months ago
DecisionQoS: An Adaptive, Self-Evolving QoS Arbitration Module for Storage Systems
As a consequence of the current trend towards consolidating computing, storage and networking infrastructures into large centralized data centers, applications compete for shared ...
Sandeep Uttamchandani, Guillermo A. Alvarez, Gul A...