Sciweavers

1159 search results - page 59 / 232
» The LINK system: MUC-4 test results and analysis
Sort
View
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 5 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
ICPR
2008
IEEE
14 years 2 months ago
Fractal-based system for Arabic/Latin, printed/handwritten script identification
In this paper, we present multilingual automatic identification of Arabic and Latin in both handwritten and printed script. The proposed scheme is based, Firstly, on morphological...
Sami Ben Moussa, Abderrazak Zahour, Abdellatif Ben...
IOLTS
2008
IEEE
117views Hardware» more  IOLTS 2008»
14 years 2 months ago
Verification and Analysis of Self-Checking Properties through ATPG
Present and future semiconductor technologies are characterized by increasing parameters variations as well as an increasing susceptibility to external disturbances. Transient err...
Marc Hunger, Sybille Hellebrand
USS
2010
13 years 5 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...
KES
2009
Springer
14 years 8 days ago
Virtual Communities of Practice's Purpose Evolution Analysis Using a Concept-Based Mining Approach
Today, social networks systems have become more and more important. People have change their way to relate and communicate. Therefore, how to enhance contents and organization of a...
Sebastián A. Ríos, Felipe Aguilera, ...