Sciweavers

347 search results - page 60 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 4 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 4 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
DGO
2008
114views Education» more  DGO 2008»
14 years 11 months ago
Towards a business continuity information network for rapid disaster recovery
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities such as the terrorist attacks of September 11th 20...
Khalid Saleem, Steven Luis, Yi Deng, Shu-Ching Che...
ICICS
2005
Springer
15 years 3 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
HICSS
2002
IEEE
143views Biometrics» more  HICSS 2002»
15 years 2 months ago
Business Intelligence in Healthcare Organizations
The management of healthcare organizations starts to recognize the relevance of the definition of care products in relation to management information. In the turmoil between costs...
Ton A. M. Spil, Robert A. Stegwee, Christian J. A....