Sciweavers

347 search results - page 25 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 4 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
HICSS
2002
IEEE
79views Biometrics» more  HICSS 2002»
15 years 2 months ago
Managerial Openness and the Adoption of Distributed Group Support Systems: The Case of WebWide Participation
The problem of total participation in asynchronous meetings convened with distributed group support systems has been noted frequently but investigated rarely. This paper describes...
John Rhorbaugh
GCB
2009
Springer
139views Biometrics» more  GCB 2009»
15 years 1 months ago
Graph-Kernels for the Comparative Analysis of Protein Active Sites
Abstract: Graphs are often used to describe and analyze the geometry and physicochemical composition of biomolecular structures, such as chemical compounds and protein active sites...
Thomas Fober, Marco Mernberger, Ralph Moritz, Eyke...
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 3 months ago
A Non-Exact Approach and Experiment Studies on the Combinatorial Auction Problem
In this paper we formulate a combinatorial auction brokering problem as a set packing problem and apply a simulated annealing heuristic with hybrid local moves to solve the proble...
Yunsong Guo, Andrew Lim, Brian Rodrigues, Yi Zhu
ACSAC
2002
IEEE
15 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti