Sciweavers

557 search results - page 31 / 112
» Two experiences designing for effective security
Sort
View
BIOID
2008
101views Biometrics» more  BIOID 2008»
13 years 10 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
DSS
2006
132views more  DSS 2006»
13 years 8 months ago
Agents with shared mental models for enhancing team decision makings
Proactive information sharing is a challenging issue faced by intelligence agencies in effectively making critical decisions under time pressure in areas related to homeland secur...
John Yen, Xiaocong Fan, Shuang Sun, Timothy Hanrat...
CHI
2006
ACM
14 years 9 months ago
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing
Wizard of Oz (WOz) testing has shown promise as an effective way to test location-enhanced applications. However, it is challenging to conduct a location-based WOz test because of...
Yang Li, Evan Welbourne, James A. Landay
PLDI
2005
ACM
14 years 2 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
MICRO
2009
IEEE
507views Hardware» more  MICRO 2009»
14 years 3 months ago
Enhancing lifetime and security of PCM-based main memory with start-gap wear leveling
Phase Change Memory (PCM) is an emerging memory technology that can increase main memory capacity in a cost-effective and power-efficient manner. However, PCM cells can endure on...
Moinuddin K. Qureshi, John Karidis, Michele France...