Sciweavers

93 search results - page 19 / 19
» A Diagrammatical Framework for Information Systems Attacks
Sort
View
PR
2010
179views more  PR 2010»
13 years 4 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
13 years 7 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 16 days ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...