Sciweavers

404 search results - page 39 / 81
» An Introduction to Evaluating Biometric Systems
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 2 months ago
Hotlist or Bibliography? A Case of Genre on the Web
Bibliography—the collection, description, and arrangement of information items—is a vibrant activity and a popular form of expression on the internet. Yet, fashionable forms o...
David G. Hendry, Allyson Carlyle
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 3 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
AVBPA
2003
Springer
152views Biometrics» more  AVBPA 2003»
14 years 1 months ago
The BANCA Database and Evaluation Protocol
In this paper we describe the acquistion and content of a new large, realistic and challenging multi-modal database intended for training and testing multi-modal verification syst...
Enrique Bailly-Bailliére, Samy Bengio, Fr&e...
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani