Sciweavers

1679 search results - page 47 / 336
» Scatter Search - Wellsprings and Challenges
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Mutual features for robust identification and verification
Noisy or distorted video/audio training sets represent constant challenges in automated identification and verification tasks. We propose the method of Mutual Interdependence An...
Heiko Claussen, Justinian Rosca, Robert I. Damper
IEEESCC
2007
IEEE
14 years 4 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
ICNS
2006
IEEE
14 years 4 months ago
Evaluating Global Optimisation for Data Grids using Replica Location Services
As efforts to develop grid computing solutions gather pace, considerable attention has been directed at defining and addressing technical requirements associated with computationa...
Ernest Sithole, Gerard P. Parr, Sally I. McClean, ...
EGOV
2005
Springer
14 years 3 months ago
Monitoring and Updating Regulations and Policies for Government Services
One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
Soon Ae Chun, Edwin Portscher, James Geller
ESORICS
2004
Springer
14 years 3 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener