Sciweavers

3814 search results - page 716 / 763
» Extensible Information Brokers
Sort
View
CASES
2006
ACM
15 years 3 months ago
Reaching fast code faster: using modeling for efficient software thread integration on a VLIW DSP
When integrating software threads together to boost performance on a processor with instruction-level parallel processing support, it is rarely clear which code regions should be ...
Won So, Alexander G. Dean
CCS
2006
ACM
15 years 3 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
CCS
2006
ACM
15 years 3 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
CCS
2006
ACM
15 years 3 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
FGR
2004
IEEE
167views Biometrics» more  FGR 2004»
15 years 3 months ago
Adaptive Learning of an Accurate Skin-Color Model
Due to variations of lighting conditions, camera hardware settings, and the range of skin coloration among human beings, a pre-defined skin-color model cannot accurately capture t...
Qiang Zhu, Kwang-Ting Cheng, Ching-Tung Wu, Yi-Leh...