Sciweavers

3082 search results - page 35 / 617
» its 2004
Sort
View
SSWMC
2004
13 years 9 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
TNC
2004
96views Education» more  TNC 2004»
13 years 9 months ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete
WSCG
2004
143views more  WSCG 2004»
13 years 9 months ago
A Framework for Tubular Organs Segmentation
Tubular organs (blood vessels and bronchial tubes), because of their anti-compact nature, generally appear randomly cross-sectioned in CT slices. Because of this, it's diffic...
Gabriel de Dietrich, Achille J.-P. Braquelaire
ECIS
2000
13 years 9 months ago
Quality and Rigour of Action Research in Information Systems
This paper discusses nature of action research, and its particular strengths in disciplines such as information systems (IS). However concerns are raised about the quality and rigo...
Judy McKay, Peter Marshall
ECIS
2000
13 years 9 months ago
Systems Development of Organizational Memory: A Literature Survey
Currently, there is no commonly accepted methodology for developing organizational memory systems (OM) that is comprehensive in the sense that it guides the development process fr...
Dov Te'eni, Hadas Weinberger