Sciweavers

26 search results - page 5 / 6
» Capacity and Examples of Template-Protecting Biometric Authe...
Sort
View
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
13 years 11 months ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
HICSS
2003
IEEE
78views Biometrics» more  HICSS 2003»
14 years 20 days ago
The Web of Governance and Democratic Accountability
Developments in e-government are resulting in fundamental reorganizations of the ways in which democratic governments operate as well as in the ways in which citizens relate to th...
Terrell A. Northrup, Stuart J. Thorson
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
14 years 1 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl
PRL
2007
287views more  PRL 2007»
13 years 6 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
ESOP
2008
Springer
13 years 9 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands