Sciweavers

110 search results - page 20 / 22
» Biometric Security Systems: Fingerprint and Speech Technolog...
Sort
View
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 7 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CLEAR
2007
Springer
140views Biometrics» more  CLEAR 2007»
15 years 3 months ago
The Rich Transcription 2007 Meeting Recognition Evaluation
We present the design and results of the Spring 2007 (RT-07) Rich Transcription Meeting Recognition Evaluation; the fifth in a series of community-wide evaluations of language tech...
Jonathan G. Fiscus, Jerome Ajot, John S. Garofolo
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 4 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
15 years 3 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
FGR
2002
IEEE
229views Biometrics» more  FGR 2002»
15 years 2 months ago
An Approach to Automatic Recognition of Spontaneous Facial Actions
We present ongoing work on a project for automatic recognition of spontaneous facial actions. Spontaneous facial expressions differ substantially from posed expressions, similar t...
Bjorn Braathen, Marian Stewart Bartlett, Gwen Litt...