Sciweavers

6195 search results - page 1145 / 1239
» Cloud Computing Security
Sort
View
CODES
2003
IEEE
15 years 9 months ago
A codesigned on-chip logic minimizer
Boolean logic minimization is traditionally used in logic synthesis tools running on powerful desktop computers. However, logic minimization has recently been proposed for dynamic...
Roman L. Lysecky, Frank Vahid
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 9 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 9 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
RTCSA
2003
IEEE
15 years 9 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
15 years 9 months ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...
« Prev « First page 1145 / 1239 Last » Next »