Sciweavers

490 search results - page 53 / 98
» Equivalent Keys of HPC
Sort
View
SICHERHEIT
2008
13 years 10 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
JCM
2006
129views more  JCM 2006»
13 years 8 months ago
Analysis of UWB Interference to MPSK Narrowband Receivers
This paper studies the in-band interference of time-hopping spread spectrum (TH-SS) ultra-wideband (UWB) signals to narrowband receivers. Based on the analysis of general power spe...
Dongsong Zeng, Amir I. Zaghloul, Annamalai Annamal...
SAC
2006
ACM
13 years 8 months ago
Transforming OCL constraints: a context change approach
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, ICs are usually specified as invariants written in the OCL. However, due to the hi...
Jordi Cabot, Ernest Teniente
AUTOMATICA
2010
127views more  AUTOMATICA 2010»
13 years 7 months ago
Partitioning datasets based on equalities among parameters
When a phenomenon is described by a parametric model and multiple datasets are available, a key problem in statistics is to discover which datasets are characterized by the same p...
Riccardo Porreca, Giancarlo Ferrari-Trecate
GLOBECOM
2010
IEEE
13 years 6 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...