Sciweavers

231 search results - page 38 / 47
» Biometric Identification
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICB
2009
Springer
137views Biometrics» more  ICB 2009»
15 years 4 months ago
Direct Pore Matching for Fingerprint Recognition
Abstract. Sweat pores on fingerprints have proven to be useful features for personal identification. Several methods have been proposed for pore matching. The state-of-the-art meth...
Qijun Zhao, Lei Zhang, David Zhang, Nan Luo
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
15 years 3 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
15 years 3 months ago
Characterizing Genres of Web Pages: Genre Hybridism and Individualization
When dealing with genres of web pages, there are two important aspects to be taken into account. On the one hand, the web is fluid, unstable and fast-paced. On the other hand, gen...
Marina Santini
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
15 years 3 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson