Sciweavers

161 search results - page 18 / 33
» Performance Evaluation of Fingerprint Verification Systems
Sort
View
WWW
2005
ACM
14 years 8 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
HT
2004
ACM
14 years 23 days ago
A linking and interaction evaluation test set for SMIL
The SMIL 2.0 Language profile support several mechanisms for controlling interactivity in a SMIL 2.0 presentation. Unfortunately, the SMIL standard testset does not verify complex...
Dick C. A. Bulterman
WSCG
2004
143views more  WSCG 2004»
13 years 8 months ago
Palmprint Verification with Moments
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure bet...
Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Che...
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 7 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
AISS
2010
165views more  AISS 2010»
13 years 4 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi