Sciweavers

1663 search results - page 91 / 333
» Computer Security in the Real World
Sort
View
RTCSA
2003
IEEE
14 years 2 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
14 years 2 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
GIS
2005
ACM
14 years 10 months ago
Contraflow network reconfiguration for evacuation planning: a summary of results
Contraflow, or lane reversal, is a way of increasing outbound capacity of a real network by reversing the direction of inbound roads during evacuations. The contraflow is consider...
Sangho Kim, Shashi Shekhar
BTW
2009
Springer
145views Database» more  BTW 2009»
14 years 3 months ago
Towards web Supported Identification of Top Affiliations from Scholarly Papers
: Frequent successful publications by specific institutions are indicators for identifying outstanding centres of research. This institution data are present in scholarly papers as...
David Aumüller
EUROPAR
2007
Springer
14 years 3 months ago
Adaptable Distance-Based Decision-Making Support in Dynamic Cross-Grid Environment
The grid environment presents numerous opportunities for business applications as well as for scientific ones. Nevertheless the current trends seem to lead to several independent ...
Julien Gossa, Jean-Marc Pierson, Lionel Brunie