Sciweavers

497 search results - page 94 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
RTAS
2008
IEEE
14 years 1 months ago
Hybrid Timing Analysis of Modern Processor Pipelines via Hardware/Software Interactions
Embedded systems are often subject to constraints that require determinism to ensure that task deadlines are met. Such systems are referred to as real-time systems. Schedulability...
Sibin Mohan, Frank Mueller
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 28 days ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
13 years 11 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
CIKM
2006
Springer
13 years 11 months ago
Knowing a web page by the company it keeps
Web page classification is important to many tasks in information retrieval and web mining. However, applying traditional textual classifiers on web data often produces unsatisfyi...
Xiaoguang Qi, Brian D. Davison
CIKM
2006
Springer
13 years 11 months ago
Multi-evidence, multi-criteria, lazy associative document classification
We present a novel approach for classifying documents that combines different pieces of evidence (e.g., textual features of documents, links, and citations) transparently, through...
Adriano Veloso, Wagner Meira Jr., Marco Cristo, Ma...