Sciweavers

173 search results - page 26 / 35
» Classification of RFID Attacks
Sort
View
CHI
2009
ACM
14 years 2 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
ICB
2007
Springer
159views Biometrics» more  ICB 2007»
13 years 11 months ago
Coarse Iris Classification by Learned Visual Dictionary
Abstract. In state-of-the-art iris recognition systems, the input iris image has to be compared with a large number of templates in database. When the scale of iris database increa...
Xianchao Qiu, Zhenan Sun, Tieniu Tan
JUCS
2008
136views more  JUCS 2008»
13 years 7 months ago
Crime Scene Representation (2D, 3D, Stereoscopic Projection) and Classification
: In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be u...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
JDCTA
2008
160views more  JDCTA 2008»
13 years 7 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
TKDE
2011
183views more  TKDE 2011»
13 years 2 months ago
Mining Discriminative Patterns for Classifying Trajectories on Road Networks
—Classification has been used for modeling many kinds of data sets, including sets of items, text documents, graphs, and networks. However, there is a lack of study on a new kind...
Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hong Cheng