Sciweavers

1897 search results - page 219 / 380
» eg 2007
Sort
View
IEEEARES
2007
IEEE
14 years 3 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
IEEEIAS
2007
IEEE
14 years 3 months ago
Generative Models for Fingerprint Individuality using Ridge Types
Generative models of pattern individuality attempt to represent the distribution of observed quantitative features, e.g., by learning parameters from a database, and then use such...
Gang Fang, Sargur N. Srihari, Harish Srinivasan
IEEESCC
2007
IEEE
14 years 3 months ago
Business-Activity Driven Search: Addressing the Information Needs of Services Professionals
Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
IJCNN
2007
IEEE
14 years 3 months ago
Philosophical Aspects of Neural, Probabilistic and Fuzzy Modeling of Language Use and Translation
— Serious efforts to develop computerized systems for natural language understanding and machine translation have taken place for more than half a century. Some successful system...
Timo Honkela
INFOCOM
2007
IEEE
14 years 3 months ago
Path Selection and Multipath Congestion Control
— In this paper we investigate the potential benefits of coordinated congestion control for multipath data transfers, and contrast with uncoordinated control. For static random ...
Peter B. Key, Laurent Massoulié, Donald F. ...