Sciweavers

335 search results - page 50 / 67
» Biometrics and Security
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 8 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
15 years 7 months ago
Sliding Window Protocol for Group Communication in Ad-Hoc Networks
Existing ad hoc routing protocols are either unicast or multicast. In this paper we propose a simple extension to the Dynamic Source Routing Protocol (DSR) to cater for group comm...
In Joe Khor, Johnson P. Thomas, Istvan Jonyer
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
14 years 11 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
HICSS
2008
IEEE
156views Biometrics» more  HICSS 2008»
15 years 8 months ago
A Centrality Measure for Electrical Networks
—We derive a measure of “electrical centrality” for AC power networks, which describes the structure of the network as a function of its electrical topology rather than its p...
Paul Hines, Seth Blumsack
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 7 months ago
Online Fundraising for Environmental Nonprofit Organizations
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Irene Pollach, Horst Treiblmaier, Arne Floh