Sciweavers

680 search results - page 35 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
BIOID
2008
117views Biometrics» more  BIOID 2008»
13 years 9 months ago
Definition of Fingerprint Scanner Image Quality Specifications by Operational Quality
This paper analyzes two recently released image quality specifications for single-finger scanners and proposes three new specifications targeted to different types of applications....
A. Alessandroni, Raffaele Cappelli, Matteo Ferrara...
ENTCS
2010
127views more  ENTCS 2010»
13 years 7 months ago
Action Prefixes: Reified Synchronization Paths in Minimal Component Interaction Automata
Component Interaction Automata provide a fitting model to capture and analyze the temporal facets of hierarchical-structured component-oriented software systems. However, the rule...
Markus Lumpe
CACM
2006
192views more  CACM 2006»
13 years 7 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein
WWW
2006
ACM
14 years 8 months ago
Invasive browser sniffing and countermeasures
We describe the detrimental effects of browser cache/history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL person...
Markus Jakobsson, Sid Stamm
APAQS
2000
IEEE
13 years 12 months ago
Quality Improvement - The Six Sigma Way
Six Sigma provides an effective mechanism to focus on customer requirements, through improvement of process quality. In the Global Engineering Development Center of Tata Consultan...
Mala Murugappan, Gargi Keeni