Sciweavers

3953 search results - page 522 / 791
» Enhancing web accessibility
Sort
View
ICIAR
2010
Springer
15 years 9 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
119
Voted
ISCC
2000
IEEE
15 years 9 months ago
The Use of Software Agents as Proxies
Today information can be accessed from the Internet using a variety of devices and via different types of networks. With such diversity, it is impossible for a server on the Inter...
Binh Thai, Aruna Seneviratne
ITC
2000
IEEE
74views Hardware» more  ITC 2000»
15 years 9 months ago
A good excuse for reuse: "open" TAP controller design
In this paper we present a design for IEEE 1149.1 Test Access Port (TAP)controllers that is based on a practical reuse methodology. While the basic use and core functionality of T...
David B. Lavo
142
Voted
WETICE
2000
IEEE
15 years 9 months ago
DEMOIR: A Hybrid Architecture for Expertise Modeling and Recommender Systems
Although employees’ expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently...
Dawit Yimam, Alfred Kobsa
FPL
1998
Springer
99views Hardware» more  FPL 1998»
15 years 9 months ago
Exploiting Contemporary Memory Techniques in Reconfigurable Accelerators
This paper discusses the memory interface of custom computing machines. We present a high speed parallel memory for the MoM-PDA machine, which is based on the Xputer paradigm. The ...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...