Sciweavers

82 search results - page 17 / 17
» Face authentication using a hybrid approach
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
13 years 10 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 4 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham