Sciweavers

13717 search results - page 2718 / 2744
» Control Systems
Sort
View
ICASSP
2010
IEEE
14 years 10 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
FSKD
2010
Springer
241views Fuzzy Logic» more  FSKD 2010»
14 years 9 months ago
FUZPAG: A fuzzy-controlled packet aggregation scheme for wireless mesh networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop backhaul networks in which mesh routers relay traffic on behalf of clients or other routers. Due to large MAC layer ov...
Peter Dely, Andreas Kassler, Nico Bayer, Hans Joac...
HPDC
2010
IEEE
14 years 9 months ago
Software architecture definition for on-demand cloud provisioning
Cloud computing [22] is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitat...
Clovis Chapman, Wolfgang Emmerich, Fermín G...
AC
2007
Springer
14 years 9 months ago
Free/Open Source Software Development: Recent Research Results and Methods
The focus of this chapter is to review what is known about free and open source software development (FOSSD) work practices, development processes, project and community dynamics,...
Walt Scacchi
AI
2008
Springer
14 years 9 months ago
The well-designed young mathematician
This paper complements McCarthy's "The well designed child", in part by putting it in a broader context, the space of possible well designed progeny, and in part by...
Aaron Sloman
« Prev « First page 2718 / 2744 Last » Next »