Sciweavers

AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju
AVBPA
2005
Springer
282views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Secure Fingerprint Matching with External Registration
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
James Reisman, Umut Uludag, Arun Ross
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
HICSS
2005
IEEE
162views Biometrics» more  HICSS 2005»
14 years 1 months ago
An Agent-Based Approach to Study Virtual Learning Communities
This paper focuses on agent-based approach to study the relationship between the individual behavior of participants and the overall development of a virtual community, to help pe...
Yiwen Zhang, Mohan Tanniru
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
14 years 1 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 1 months ago
Selecting Structural Patterns for Classification
Wan-Shiou Yang, San-Yih Hwang, Jaideep Srivastava
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
14 years 1 months ago
Cournot Equilibrium in Price-Capped Two-Settlement Electricity Markets
Abstract— We compare two alternative mechanisms for capping prices in two-settlement electricity markets. With sufficient lead time and competitive entry opportunities, forward ...
Jian Yao, Bert Willems, Shmuel S. Oren, Ilan Adler
HICSS
2005
IEEE
160views Biometrics» more  HICSS 2005»
14 years 1 months ago
Using Content and Process Scaffolds to Support Collaborative Discourse in Asynchronous Learning Networks
Discourse, a form of collaborative learning [44], is one of the most widely used methods of teaching and learning in the online environment. Particularly in large courses, discour...
I. Wong-Bushby, Starr Roxanne Hiltz, Michael Biebe...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 1 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
HICSS
2005
IEEE
99views Biometrics» more  HICSS 2005»
14 years 1 months ago
Impacts of Vertical IS Standards: The Case of the US Home Mortgage Industry
Vertical IS standards prescribe data structures and definitions, document formats, and business processes for particular industries, in contrast to horizontal IT standards, which ...
Rolf T. Wigand, Charles W. Steinfield, M. Lynne Ma...