Sciweavers

5232 search results - page 963 / 1047
» Generative modeling: a symbolic system for geometric modelin...
Sort
View
DIM
2006
ACM
14 years 1 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
WETICE
2000
IEEE
14 years 2 days ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
CHI
1997
ACM
13 years 12 months ago
A Computer Participant in Musical Improvisation
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
William F. Walker
HYBRID
2005
Springer
14 years 1 months ago
Mode-Automata Based Methodology for Scade
In this paper, we present a new design methodology for synchronous reactive systems, based on a clear separation between control and data flow parts. This methodology allows to fa...
Ouassila Labbani, Jean-Luc Dekeyser, Pierre Boulet
WORM
2003
13 years 9 months ago
Access for sale: a new class of worm
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...
Stuart E. Schechter, Michael D. Smith