Sciweavers

1296 search results - page 32 / 260
» Multiplicative Background Risk
Sort
View
78
Voted
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
15 years 7 months ago
Antecedents to E-File Adoption: The U.S. Perspective
One of congress’ goals for 2007 was for 80% of all tax and informational returns to be filed electronically [9]. However, to date that lofty goal has fallen well short. This res...
Lemuria Carter, Ludwig Christian Schaupp, Allison ...
IPOM
2009
Springer
15 years 5 months ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
BIOSIG
2009
75views Biometrics» more  BIOSIG 2009»
15 years 1 months ago
Multi-Sample Fusion with Template Protection
: The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, f...
Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Ve...
81
Voted
JCIT
2008
102views more  JCIT 2008»
15 years 13 days ago
Architectural Patterns for Finding your
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
N. Sankar Ram, Paul Rodrigues
85
Voted
TIT
2002
60views more  TIT 2002»
15 years 3 days ago
Spectral efficiency in the wideband regime
Backgrounds Wideband Slope S0 Achieving Minimum Bandwidth Multiple Access Closing Remarks "Spectral Efficiency in the Wideband Regime" and "Recent Results on the Ca...
Sergio Verdú