Sciweavers

8697 search results - page 1511 / 1740
» An Approach to the Enterprise Integration
Sort
View
IJNSEC
2007
189views more  IJNSEC 2007»
13 years 10 months ago
When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA
This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
Alessandra Lumini, Loris Nanni
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 10 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
INFORMATICALT
2007
97views more  INFORMATICALT 2007»
13 years 10 months ago
Fabric Level and Application Level QoS Guarantees in Grid Computing
In the paper, a cross-layer optimization between application layer and fabric layer is proposed. The aim is to optimize the end-to-end quality of the dynamic grid application as we...
Li Chunlin, Li Layuan
TCS
2008
13 years 10 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
BC
2005
78views more  BC 2005»
13 years 10 months ago
Velocity constancy and models for wide-field visual motion detection in insects
The tangential neurons in the lobula plate region of the flies are known to respond to visual motion across broad receptive fields in visual space. When intracellular recordings ar...
Patrick A. Shoemaker, David C. O'Carroll, A. D. St...
« Prev « First page 1511 / 1740 Last » Next »