Sciweavers

1282 search results - page 208 / 257
» Signing on signing off
Sort
View
IASTEDSEA
2004
13 years 10 months ago
Deriving change architectures from RCS history
As software systems evolve over a series of releases, it becomes important to know which components show repeated need for maintenance. Deterioration of a single component manifes...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
ICVGIP
2004
13 years 10 months ago
Fingerprint Classification Using Orientation Field Flow Curves
Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. We propose an automatic approach of ...
Sarat C. Dass, Anil K. Jain
ISCAPDCS
2004
13 years 10 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
ISSA
2004
13 years 10 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 10 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng