Sciweavers

291 search results - page 29 / 59
» Enforceable social laws
Sort
View
WACV
2002
IEEE
15 years 2 months ago
A PDA-based Face Recognition System
In this paper, we present a PDA-based face recognition system as well as some of the associated challenges of developing a PDAbased face recognition system. We describe a prototyp...
Jie Yang, Xilin Chen, William Kunz
78
Voted
ETRICS
2006
15 years 1 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
ISBMS
2010
Springer
14 years 11 months ago
Optimization of Case-Specific Vascular Tree Models Based on Vessel Size Imaging
We analyze a problem, which is relevant for physiological modeling of vascular networks: the initialization and optimization of specific, individual models of a functioning vessel ...
Bryn A. Lloyd, Sven Hirsch, Gábor Szé...
DMIN
2006
105views Data Mining» more  DMIN 2006»
14 years 11 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
ACSW
2003
14 years 11 months ago
Flexible Enterprise Access Control with Object-oriented View Specification
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Mark Evered