Sciweavers

18016 search results - page 3529 / 3604
» Data Mining - Concepts and Techniques
Sort
View
ASPLOS
2000
ACM
14 years 1 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
VRST
2000
ACM
14 years 1 months ago
Web-based 3D media information system
This paper introduces web-based 3D media information system. We first address two promising 3D modeling techniques, i.e., image-based 3D modeling and laser scanning based 3D model...
Yong-Moo Kwon, Ig-Jae Kim, Sang Chul Ahn, Hyoung-G...
ICPR
2010
IEEE
14 years 1 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
14 years 1 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...
ICCAD
1999
IEEE
86views Hardware» more  ICCAD 1999»
14 years 1 months ago
A framework for testing core-based systems-on-a-chip
Available techniques for testing core-based systems-on-a-chip (SOCs) do not provide a systematic means for synthesising low-overhead test architectures and compact test solutions....
Srivaths Ravi, Ganesh Lakshminarayana, Niraj K. Jh...
« Prev « First page 3529 / 3604 Last » Next »