Sciweavers

577 search results - page 44 / 116
» Engineering Sufficiently Secure Computing
Sort
View
149
Voted
ICPR
2010
IEEE
15 years 17 days ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
ICWE
2010
Springer
15 years 1 months ago
A Process Framework for Semantics-Aware Tourism Information Systems
: The growing sophistication of user requirements in tourism due to the advent of new technologies such as the Semantic Web and mobile computing has imposed new possibilities for i...
J. Olawande Daramola
107
Voted
ACMSE
2006
ACM
15 years 8 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
116
Voted
COMSWARE
2007
IEEE
15 years 9 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
151
Voted
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 4 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...