Sciweavers

347 search results - page 21 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
15 years 4 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
SCIA
2005
Springer
15 years 3 months ago
Eye-Movements as a Biometric
We propose the use of eye-movements as a biometric. A case study investigating potentials of eye-movement data for biometric purposes was conducted. Twelve participants’ eye-move...
Roman Bednarik, Tomi Kinnunen, Andrei Mihaila, Pas...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
15 years 4 months ago
Adaptive Systems Require Adaptive Support--When Tools Attack!
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
Jennifer Baldwin, Yvonne Coady
USS
2010
14 years 7 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
15 years 4 months ago
E-Government Challenges and the Role of Political Leadership in Indonesia: The Case of Sragen
In general, developing countries are lagging behind in egovernment adoption compared to developed countries. Within Indonesia, there is a huge disparity in egovernment implementat...
Bjørn Furuholt, Fathul Wahid