Sciweavers

9503 search results - page 5 / 1901
» Authenticated System Calls
Sort
View
ICWN
2008
14 years 9 days ago
A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In t...
Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Z...
CHI
2009
ACM
14 years 11 months ago
Tactful calling: urgency-augmented phone calls through high-resolution pressure input on mobile phones
In this paper we present a system that simulates urgency-augmented phone calls on mobile phones. Different scenarios and interaction techniques are discussed. We report a user stu...
Fabian Hemmert, Matthias Löwe, Anne Wohlauf, ...
OTM
2005
Springer
14 years 4 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
MLMI
2005
Springer
14 years 4 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
CEAS
2007
Springer
14 years 5 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...