Sciweavers

8982 search results - page 1702 / 1797
» Applications of Aglet Technology
Sort
View
HIPC
2007
Springer
14 years 3 months ago
Channel Adaptive Real-Time MAC Protocols for a Two-Level Heterogeneous Wireless Network
Abstract. Wireless technology is becoming an attractive mode of communication for real-time applications in typical settings such as in an industrial setup because of the tremendou...
Kavitha Balasubramanian, G. Sudha Anil Kumar, G. M...
ICB
2007
Springer
208views Biometrics» more  ICB 2007»
14 years 3 months ago
Face Matching Between Near Infrared and Visible Light Images
Abstract. In many applications, such as E-Passport and driver’s license, the enrollment of face templates is done using visible light (VIS) face images. Such images are normally ...
Dong Yi, Rong Liu, Rufeng Chu, Zhen Lei, Stan Z. L...
ICISS
2007
Springer
14 years 3 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
ICSE
2007
IEEE-ACM
14 years 3 months ago
Fifth Workshop on Software Quality
Cost, schedule and quality are highly correlated factors in software development. They basically form three sides of the same triangle. Beyond a certain point (the “Quality is F...
Barry W. Boehm, Sunita Chulani, June M. Verner, Be...
IH
2007
Springer
14 years 3 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
« Prev « First page 1702 / 1797 Last » Next »