Sciweavers

632 search results - page 84 / 127
» Two Facets of Authentication
Sort
View
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
12 years 11 months ago
FlexMin: a flexible tool for automatic bug isolation in DBMS software
Debugging a database engine is an arduous task due to the complexity of the query workloads and systems. The first step in isolating a bug involves identifying a sequence of step...
Kristi Morton, Nicolas Bruno
ICCV
2009
IEEE
15 years 1 months ago
A Riemannian Analysis of 3D Nose Shapes For Partial Human Biometrics
In this paper we explore the use of shapes of noses for performing partial human biometrics. The basic idea is to represent nasal surfaces using indexed collections of isocurves,...
Hassen drira, Boulbaba Ben Amor, Anuj Srivastava, ...
ICIP
2000
IEEE
14 years 10 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
ICPR
2008
IEEE
14 years 10 months ago
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics
Cancelable biometric systems are gaining in popularity for use in person authentication for applications where the privacy and security of biometric templates are important consid...
Achint Oommen Thomas, Nalini K. Ratha, Jonathan H....
INFOCOM
2009
IEEE
14 years 3 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar