Sciweavers

9186 search results - page 1252 / 1838
» A Module System for Scheme
Sort
View
PR
2010
220views more  PR 2010»
15 years 3 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 10 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
DAC
2002
ACM
16 years 6 months ago
The next chip challenge: effective methods for viable mixed technology SoCs
The next generation of computer chips will continue the trend for more complexity than their predecessors. Many of them will contain different chip technologies and are termed SoC...
H. Bernhard Pogge
ISBI
2002
IEEE
16 years 5 months ago
Towards high performance small animal positron emission tomography
During the last decade increasingly sophisticated positron emission tomography (PET) scanners have been developed for imaging small laboratory animals. These systems often exhibit...
Calvin A. Johnson, Jürgen Seidel, Javier Pasc...
ACSAC
2009
IEEE
15 years 12 months ago
Scalable Web Content Attestation
—The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that info...
Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman...
« Prev « First page 1252 / 1838 Last » Next »