Sciweavers

6137 search results - page 1222 / 1228
» Securing Collaborative Applications
Sort
View
CONCURRENCY
2002
152views more  CONCURRENCY 2002»
13 years 8 months ago
The Legion Grid Portal
-- The Legion Grid Portal is an interface to a grid system. Users interact with the portal, and hence a grid through an intuitive interface from which they can view files, submit a...
Anand Natrajan, Anh Nguyen-Tuong, Marty Humphrey, ...
IPM
2002
106views more  IPM 2002»
13 years 8 months ago
A feature mining based approach for the classification of text documents into disjoint classes
This paper proposes a new approach for classifying text documents into two disjoint classes. The new approach is based on extracting patterns, in the form of two logical expressio...
Salvador Nieto Sánchez, Evangelos Triantaph...
PRL
2007
287views more  PRL 2007»
13 years 8 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
NETWORK
2008
233views more  NETWORK 2008»
13 years 8 months ago
WhozThat? evolving an ecosystem for context-aware mobile social networks
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...
INFOCOM
2010
IEEE
13 years 7 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
« Prev « First page 1222 / 1228 Last » Next »