Sciweavers

347 search results - page 22 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
Challenges in Executing Data Intensive Biometric Workloads on a Desktop Grid
Desktop grids have traditionally focused on executing computation intensive workloads. Can they also be used to execute data-intensive workloads? To answer this question, we prese...
Christopher Moretti, Timothy C. Faltemier, Douglas...
TMM
2011
146views more  TMM 2011»
14 years 4 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
HICSS
2008
IEEE
180views Biometrics» more  HICSS 2008»
15 years 4 months ago
Systems Theory and Knowledge Management Systems: The Case of Pratt-Whitney Rocketdyne
Abstract. Despite a growing body of research on knowledge management (KM) systems, many managers are still unsure how they can implement a KM system that will effectively contribut...
Mark Chun, Kiho Sohn, Priscilla Arling, Nelson F. ...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 4 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
HICSS
2006
IEEE
282views Biometrics» more  HICSS 2006»
15 years 4 months ago
Knowledge Management System for Emergency Preparedness: An Action Research Study
This paper is about the design and implementation of an information system, using Wiki technology to improve the emergency preparedness efforts of the Claremont University Consort...
Murali Raman, Terry Ryan, Lorne Olfman