Sciweavers

1466 search results - page 31 / 294
» Completeness of the Authentication Tests
Sort
View
TWC
2008
109views more  TWC 2008»
13 years 7 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
RTCSA
2007
IEEE
14 years 2 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
GECCO
2004
Springer
117views Optimization» more  GECCO 2004»
14 years 1 months ago
Evaluating Evolutionary Testability with Software-Measurements
Test case design is the most important test activity with respect to test quality. For this reason, a large number of testing methods have been developed to assist the tester with ...
Frank Lammermann, André Baresel, Joachim We...
JAVA
2001
Springer
14 years 4 days ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Efficient Recognition of Authentic Dynamic Facial Expressions on the Feedtum Database
In order to allow for fast recognition of a user’s affective state we discuss innovative holistic and self organizing approaches for efficient facial expression analysis. The f...
Frank Wallhoff, Björn Schuller, Michael Hawel...