Sciweavers

136 search results - page 22 / 28
» Baaz: A System for Detecting Access Control Misconfiguration...
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
CANDC
2007
ACM
14 years 24 days ago
Eye-balls: juggling with the virtual
The authors will introduce and demonstrate a novel computer vision based system for augmented performance. Unlike previous systems, which have primarily focused on `high art'...
Joe Marshall, Steve Benford, Tony P. Pridmore
ICICIC
2006
IEEE
14 years 2 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
ICTAC
2005
Springer
14 years 2 months ago
Toward an Abstract Computer Virology
n abstract computer virology G. Bonfante, M. Kaczmarek, and J-Y Marion Loria, Calligramme project, B.P. 239, 54506 VandÅ“uvre-l`es-Nancy C´edex, France, and ´Ecole Nationale SupÂ...
Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves ...
JSAC
2011
137views more  JSAC 2011»
13 years 3 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...