Sciweavers

11065 search results - page 2103 / 2213
» Education
Sort
View
TE
2010
95views more  TE 2010»
14 years 11 months ago
Support for Different Roles in Software Engineering Master's Thesis Projects
Like many engineering programs in Europe, the final part of most Swedish software engineering programs is a longer project in which the students write a Master's thesis. These...
Martin Höst, Robert Feldt, Frank Lüders
TELSYS
2010
147views more  TELSYS 2010»
14 years 11 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
TELSYS
2010
140views more  TELSYS 2010»
14 years 11 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
TELSYS
2010
154views more  TELSYS 2010»
14 years 11 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
TIFS
2010
137views more  TIFS 2010»
14 years 11 months ago
On the dynamic selection of biometric fusion algorithms
Biometric fusion consolidates the output of multiple biometric classifiers to render a decision about the identity of an individual. We consider the problem of designing a fusion s...
Mayank Vatsa, Richa Singh, Afzel Noore, Arun Ross
« Prev « First page 2103 / 2213 Last » Next »