Sciweavers

272 search results - page 46 / 55
» Detecting Altered Fingerprints
Sort
View
ATC
2009
Springer
15 years 3 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
DIMVA
2008
15 years 1 months ago
On Race Vulnerabilities in Web Applications
Abstract A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, ...
Roberto Paleari, Davide Marrone, Danilo Bruschi, M...
CCS
2010
ACM
14 years 12 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
TMI
2008
88views more  TMI 2008»
14 years 11 months ago
Adaptive SPECT
Abstract--Adaptive imaging systems alter their dataacquisition configuration or protocol in response to the image information received. An adaptive pinhole SPECT system might acqui...
Harrison H. Barrett, L. R. Furenlid, M. Freed, J. ...
CAD
2005
Springer
14 years 11 months ago
Geometric algorithms for rapidly reconfigurable mold manufacturing of free-form objects
This paper presents geometric algorithms for developing a re-configurable tooling system for fabrication of freeform objects. The proposed method involves a mold block, with n fac...
Aditya Kelkar, Rakesh Nagi, Bahattin Koc