Sciweavers

272 search results - page 46 / 55
» Detecting Altered Fingerprints
Sort
View
130
Voted
ATC
2009
Springer
15 years 6 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
106
Voted
DIMVA
2008
15 years 4 months ago
On Race Vulnerabilities in Web Applications
Abstract A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, ...
Roberto Paleari, Davide Marrone, Danilo Bruschi, M...
113
Voted
CCS
2010
ACM
15 years 3 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
TMI
2008
88views more  TMI 2008»
15 years 3 months ago
Adaptive SPECT
Abstract--Adaptive imaging systems alter their dataacquisition configuration or protocol in response to the image information received. An adaptive pinhole SPECT system might acqui...
Harrison H. Barrett, L. R. Furenlid, M. Freed, J. ...
114
Voted
CAD
2005
Springer
15 years 3 months ago
Geometric algorithms for rapidly reconfigurable mold manufacturing of free-form objects
This paper presents geometric algorithms for developing a re-configurable tooling system for fabrication of freeform objects. The proposed method involves a mold block, with n fac...
Aditya Kelkar, Rakesh Nagi, Bahattin Koc