Sciweavers

6682 search results - page 1336 / 1337
» networks 2006
Sort
View
JEI
2008
109views more  JEI 2008»
13 years 3 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
CONSTRAINTS
2010
153views more  CONSTRAINTS 2010»
13 years 2 months ago
Philosophy of the MiniZinc challenge
MiniZinc arose as a response to the extended discussion at CP2006 of the need for a standard modelling language for CP. This is a challenging problem, and we believe MiniZinc makes...
Peter J. Stuckey, Ralph Becket, Julien Fischer
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 2 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
NAR
2011
212views Computer Vision» more  NAR 2011»
12 years 8 months ago
UKPMC: a full text article resource for the life sciences
UK PubMed Central (UKPMC) is a full-text article database that extends the functionality of the original PubMed Central (PMC) repository. The UKPMC project was launched as the fir...
Johanna R. McEntyre, Sophia Ananiadou, Stephen And...
EUROSYS
2006
ACM
14 years 2 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
« Prev « First page 1336 / 1337 Last » Next »