Sciweavers

1356 search results - page 178 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
NSDI
2008
13 years 10 months ago
Centered Discretization with Application to Graphical Passwords
Discretization is used in click-based graphical passwords so that approximately correct entries can be accepted by the system. We show that the existing discretization scheme of B...
Sonia Chiasson, Jayakumar Srinivasan, Robert Biddl...
FGR
2004
IEEE
159views Biometrics» more  FGR 2004»
13 years 11 months ago
Null Space-based Kernel Fisher Discriminant Analysis for Face Recognition
The null space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysi...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan
ATAL
2005
Springer
14 years 1 months ago
Formalising trust for online communities
Provision of services within a virtual framework for resource sharing across institutional boundaries has become an active research area. Many such services encode access to compu...
Ali Shaikh Ali, Omer F. Rana
ICDCS
1999
IEEE
14 years 12 days ago
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems
There is growing interest in run-time detection as parallel and distributed systems grow larger and more complex. This work targets run-time analysis of complex, interactive scien...
Beth Plale, Karsten Schwan
EWSN
2006
Springer
14 years 7 months ago
A Measurement-Based Analysis of the Interaction Between Network Layers in TinyOS
There have been a number of recent proposals for link and network-layer protocols in the sensor networking literature, each of which claims to be superior to other approaches. Howe...
Umberto Malesci, Samuel Madden