Sciweavers

1834 search results - page 247 / 367
» Public Key Cryptography
Sort
View
ICIP
2009
IEEE
14 years 9 months ago
Palmprint Verification Using Consistent Orientation Coding
Developing accurate and robust palmprint verification algorithms is one of the key issues in automatic palmprint recognition systems. Recently, orientation based coding algorithms...
WWW
2008
ACM
14 years 8 months ago
Extraction and mining of an academic social network
This paper addresses several key issues in extraction and mining of an academic social network: 1) extraction of a researcher social network from the existing Web; 2) integration ...
Jie Tang, Jing Zhang, Limin Yao, Juan-Zi Li
CHI
2005
ACM
14 years 8 months ago
TxtBoard: from text-to-person to text-to-home
The design of existing mobile phone technology has emphasised the primacy of person-to-person communication for voice, SMS and image-based communication. It may be contrasted with...
Kenton O'Hara, Richard H. R. Harper, Axel Unger, J...
PAM
2010
Springer
14 years 2 months ago
Quantifying the Pitfalls of Traceroute in AS Connectivity Inference
Although traceroute has the potential to discover AS links that are invisible to existing BGP monitors, it is well known that the common approach for mapping router IP address to A...
Yu Zhang, Ricardo V. Oliveira, Hongli Zhang, Lixia...
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 2 months ago
Implementation of Internet Technology for Local Government Website: Design Guidelines
There may be limited resources for local government website designers to devote to innovative design. This study investigated current technology use by local government (Town of B...
Hyung Nam Kim, Andrea L. Kavanaugh, Tonya L. Smith...