Sciweavers

347 search results - page 47 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
DAC
2003
ACM
15 years 11 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
15 years 3 months ago
An ERP Maintenance Model
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
Celeste See Pui Ng, Guy G. Gable, Taizan Chan
IAW
2003
IEEE
15 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 4 months ago
Issues Related to Development of E/E Product Line Architectures in Heavy Vehicles
The amount of electronics in vehicles is growing quickly, thus systems are becoming increasingly complex which makes the engineering of these software intensive systems more and m...
Peter Wallin, Stefan Johnsson, Jakob Axelsson
ICAIL
2003
ACM
15 years 3 months ago
Towards a Computational Account of Persuasion in Law
In this paper we attempt to give an account of reasoning with legal cases contextualised within a general theory of persuasion in practical reasoning. We begin by presenting our g...
Katie Greenwood, Trevor J. M. Bench-Capon, Peter M...