Sciweavers

90 search results - page 12 / 18
» It's Not What You Have, But How You Use It: Compromises in M...
Sort
View
ISSA
2004
13 years 8 months ago
Using A Central Data Repository For Biometric Authentication In Passport Systems
Passports and visas are currently undergoing a rapid change due to legislation being passed by authorities such as the US requirement that they should have machine readable biomet...
Morné Breedt
PSYCHNOLOGY
2006
70views more  PSYCHNOLOGY 2006»
13 years 7 months ago
Navigating Information Space: Web site design and lessons from the built environment
The Web is the archetypal information space but even on a well designed site it can be difficult to find all the information you need. It is impossible to design a site so that al...
David Benyon
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ICFP
2004
ACM
14 years 7 months ago
Types, potency, and idempotency: why nonlinearity and amnesia make a type system work
Useful type inference must be faster than normalization. Otherwise, you could check safety conditions by running the program. We analyze the relationship between bounds on normali...
Harry G. Mairson, Peter Møller Neergaard
EWSA
2004
Springer
14 years 26 days ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer