Sciweavers

457 search results - page 79 / 92
» Recommender systems: a market-based design
Sort
View
IJBC
2006
93views more  IJBC 2006»
13 years 7 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
TCAD
2008
119views more  TCAD 2008»
13 years 7 months ago
Full-Chip Routing Considering Double-Via Insertion
As the technology node advances into the nanometer era, via-open defects are one of the dominant failures due to the copper cladding process. To improve via yield and reliability, ...
Huang-Yu Chen, Mei-Fang Chiang, Yao-Wen Chang, Lum...
EG
2010
119views more  EG 2010»
13 years 5 months ago
Internal factors affecting the adoption and use of government websites
: The purpose of this paper is to identify internal factors within government that affect the adoption and use of government websites. A conceptual framework, based on a literature...
Brian Detlor, Maureen E. Hupfer, Umar Ruhi
TIM
2011
172views more  TIM 2011»
13 years 2 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
ECEASST
2010
13 years 2 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...