Sciweavers

5477 search results - page 1046 / 1096
» Contexts, Domains, and Software
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 5 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
OOPSLA
2005
Springer
15 years 5 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
CASES
2004
ACM
15 years 5 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg
NSPW
2004
ACM
15 years 5 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
UIST
2004
ACM
15 years 5 months ago
Video-based document tracking: unifying your physical and electronic desktops
This paper presents an approach for tracking paper documents on the desk over time and automatically linking them to the corresponding electronic documents using an overhead video...
Jiwon Kim, Steven M. Seitz, Maneesh Agrawala
« Prev « First page 1046 / 1096 Last » Next »