Sciweavers

347 search results - page 53 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
15 years 3 months ago
EA Planning, Development and Management Process for Agile Enterprise Development
In this study, we suggest an enterprise architecture (EA) development process model suitable for EA projects limited in scope and time. Several EA process models have been put for...
Mirja Pulkkinen, Ari P. Hirvonen
GW
2009
Springer
156views Biometrics» more  GW 2009»
14 years 7 months ago
Influence of Handshape Information on Automatic Sign Language Recognition
Research on automatic sign language recognition (ASLR) has mostly been conducted from a machine learning perspective. We propose to implement results from human sign recognition st...
Gineke A. ten Holt, Marcel J. T. Reinders, Emile A...
ISPDC
2010
IEEE
14 years 8 months ago
Practical Uniform Peer Sampling under Churn
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
Roberto Baldoni, Marco Platania, Leonardo Querzoni...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
15 years 4 months ago
The Construction of Peers and Artifacts: The Organizing Role of "Programming Guidelines"
In this paper, we1 study new organizational forms for production processes that emerge in large scale Free/Libre Open Source Software (FLOSS) projects. We will focus on the textua...
Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli