Sciweavers

347 search results - page 37 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
IH
2005
Springer
15 years 3 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
15 years 4 months ago
An Optimization Model for Tactical Planning of Wood Procurement
This paper presents a new LP (Linear Programming) model to solve a tactical wood procurement and harvesting problem. This optimization problem occurs in several wood supply chains...
Anders Skjäl, Kaj-Mikael Björk, Jenny &O...
ICMI
2009
Springer
146views Biometrics» more  ICMI 2009»
15 years 4 months ago
Learning from preferences and selected multimodal features of players
The influence of multimodal sources of input data to the construction of accurate computational models of user preferences is investigated in this paper. The case study presented...
Georgios N. Yannakakis
HICSS
2005
IEEE
128views Biometrics» more  HICSS 2005»
15 years 3 months ago
How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information
A paradox appears to thwart traditional knowledge sharing efforts in organizations: the greater the benefit of a piece of knowledge to an organization the less likely that it will...
Sajda Qureshi, Peter Keen
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 3 months ago
The BASP Agent-Based Modeling Framework: Applications, Scenarios and Lessons Learned
The Behavior Action Simulation Platform (BASP) has been in existence since early 2000, when it was first applied to small-team reconnaissance scenarios for the United States Marin...
David S. Dixon, William N. Reynolds