Sciweavers

24529 search results - page 244 / 4906
» Computing on Authenticated Data
Sort
View
131
Voted
ICASSP
2007
IEEE
15 years 10 months ago
Adaptive Weight Estimation in Multi-Biometric Verification using Fuzzy Logic Decision Fusion
This paper describes a multi-biometric verification system that is fully adaptive to variability in data acquisition using fuzzy logic decision fusion. The system uses fuzzy logic...
Henry Pak-Sum Hui, Helen M. Meng, Man-Wai Mak
ICB
2007
Springer
427views Biometrics» more  ICB 2007»
15 years 9 months ago
"3D Face": Biometric Template Protection for 3D Face Recognition
Abstract. In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection ...
Emile J. C. Kelkboom, Berk Gökberk, Tom A. M....
118
Voted
USENIX
1994
15 years 4 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
124
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Developing a Cloud Computing Charging Model for High-Performance Computing Resources
Abstract—This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the comp...
Matthew Woitaszek, Henry M. Tufo
125
Voted
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
15 years 10 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves