Sciweavers

5488 search results - page 1061 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
15 years 6 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
PLDI
2010
ACM
16 years 1 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala
SAC
2010
ACM
15 years 11 months ago
A robust link-translating proxy server mirroring the whole web
Link-translating proxies are widely used for anonymous browsing, policy circumvention and WebVPN functions. These are implemented by encoding the destination URL in the path of th...
Ziqing Mao, Cormac Herley
COLCOM
2007
IEEE
15 years 10 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
GRID
2007
Springer
15 years 10 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
« Prev « First page 1061 / 1098 Last » Next »