Sciweavers

1513 search results - page 265 / 303
» Cryptographic Pattern Matching
Sort
View
PR
2010
220views more  PR 2010»
13 years 6 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
PROCEDIA
2010
140views more  PROCEDIA 2010»
13 years 6 months ago
Jaccard Index based availability prediction in enterprise grids
Enterprise Grid enables sharing and aggregation of a set of computing or storage resources connected by enterprise network, but the availability of the resources in this environme...
Mustafizur Rahman 0003, Md. Rafiul Hassan, Rajkuma...
PVLDB
2010
168views more  PVLDB 2010»
13 years 6 months ago
Active Complex Event Processing: Applications in Real-Time Health Care
Our analysis of many real-world event based applications has revealed that existing Complex Event Processing technology (CEP), while effective for efficient pattern matching on e...
Di Wang, Elke A. Rundensteiner, Richard Ellison, H...
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SIVP
2010
164views more  SIVP 2010»
13 years 6 months ago
Adaptive and personalized multimedia content delivery for disabled users in Internet TV
This paper aims at the delivery of adaptive and personalized multimedia content in interactive IPTV environments, using programmable IP services through the MPEG-21 standard, suppo...
Ioannis Anagnostopoulos, Christos-Nikolaos Anagnos...