Sciweavers

326 search results - page 25 / 66
» Visualization in law enforcement
Sort
View
TRUSTBUS
2005
Springer
14 years 1 months ago
Privacy Enhanced Technologies: Methods - Markets - Misuse
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
Hannes Federrath
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 1 months ago
A UML-Driven Enterprise Architecture Case Study
The U.S. Capitol Police (USCP) are responsible for protecting the Capitol Hill complex encompassing the Senate and House office buildings and the Capitol building. Currently, the ...
Frank Armour, Stephen H. Kaisler, Jim Getter, Doug...
WACV
2002
IEEE
14 years 18 days ago
A PDA-based Face Recognition System
In this paper, we present a PDA-based face recognition system as well as some of the associated challenges of developing a PDAbased face recognition system. We describe a prototyp...
Jie Yang, Xilin Chen, William Kunz
ETRICS
2006
13 years 11 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
ISBMS
2010
Springer
13 years 9 months ago
Optimization of Case-Specific Vascular Tree Models Based on Vessel Size Imaging
We analyze a problem, which is relevant for physiological modeling of vascular networks: the initialization and optimization of specific, individual models of a functioning vessel ...
Bryn A. Lloyd, Sven Hirsch, Gábor Szé...