Sciweavers

1298 search results - page 95 / 260
» Exploring second life
Sort
View
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 9 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
13 years 9 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus
TIS
2002
74views more  TIS 2002»
13 years 8 months ago
Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness
: Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy pol...
Jean-François Blanchette, Deborah G. Johnso...
FUN
2010
Springer
279views Algorithms» more  FUN 2010»
13 years 7 months ago
Cracking Bank PINs by Playing Mastermind
The bank director was pretty upset noticing Joe, the system administrator, spending his spare time playing Mastermind, an old useless game of the 70ies. He had fought the instinct ...
Riccardo Focardi, Flaminia L. Luccio
OTM
2010
Springer
13 years 7 months ago
Evaluation of Metaverse Server in a Widely-Distributed Environment
"Metaverse" is a new service connecting to three dimensional virtual space constructed as electronic data through the Internet, which is expected to be spread in the futu...
Mayu Matsubara, Masato Oguchi