Sciweavers

1795 search results - page 152 / 359
» Security Models and Information Flow
Sort
View
ICPR
2010
IEEE
15 years 3 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
AVBPA
2001
Springer
117views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Hand Recognition Using Implicit Polynomials and Geometric Features
Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Cenker Öden, Aytül Erçil, Vedat T...
ENTCS
2008
125views more  ENTCS 2008»
15 years 4 months ago
Quantum Arrows in Haskell
We argue that a realistic model for quantum computations should be general with respect to measurements, and complete with respect to the information flow between the quantum and ...
Juliana Kaizer Vizzotto, Antônio Carlos da R...
DSS
2006
132views more  DSS 2006»
15 years 4 months ago
Agents with shared mental models for enhancing team decision makings
Proactive information sharing is a challenging issue faced by intelligence agencies in effectively making critical decisions under time pressure in areas related to homeland secur...
John Yen, Xiaocong Fan, Shuang Sun, Timothy Hanrat...
NSPW
2003
ACM
15 years 9 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...