Sciweavers

2695 search results - page 133 / 539
» A Visual Approach to Validating System Level Designs
Sort
View
153
Voted
ICPR
2008
IEEE
15 years 10 months ago
Multimodal biometrics management using adaptive score-level combination
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to dynamically ensure the performance for the desired level of security. The adapti...
Ajay Kumar, Vivek Kanhangad, David Zhang
116
Voted
USENIX
2003
15 years 4 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
123
Voted
SAMOS
2004
Springer
15 years 8 months ago
Constraints Derivation and Propagation for Large-Scale Embedded Systems Exploration
Abstract— The translation of user requirements to system constraints and parameters during an exploration exercise is a hard problem, especially in the context of large scale emb...
Laurentiu Nicolae, Ed F. Deprettere
132
Voted
NN
2007
Springer
172views Neural Networks» more  NN 2007»
15 years 2 months ago
A computational neuroscience approach to consciousness
Simultaneous recordings from populations of neurons in the inferior temporal visual cortex show that most of the information about which stimulus was shown is available in the num...
Edmund T. Rolls
APVIS
2007
15 years 4 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma