Sciweavers

1527 search results - page 64 / 306
» What About Wednesday
Sort
View
CCS
2006
ACM
14 years 23 days ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
DRR
2004
13 years 11 months ago
Group discriminatory power of handwritten characters
Using handwritten characters we address two questions (i) what is the group identification performance of different alphabets (upper and lower case) and (ii) what are the best cha...
Catalin I. Tomai, Devika M. Kshirsagar, Sargur N. ...
EACL
1993
ACL Anthology
13 years 10 months ago
Abductive Explanation of Dialogue Misunderstandings
To respond to an utterance, a listener must interpret what others have said and why they have said it. Misunderstandings occur when agents differ in their beliefs about what has b...
Susan McRoy, Graeme Hirst
IJCCBS
2010
105views more  IJCCBS 2010»
13 years 7 months ago
Software safety: relating software assurance and software integrity
: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, ...
Ibrahim Habli, Richard Hawkins, Tim Kelly
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 7 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel