Sciweavers

694 search results - page 96 / 139
» Overcoming Challenges of Maturity
Sort
View
CCS
2008
ACM
15 years 1 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
CIKM
2008
Springer
15 years 1 months ago
Workload-based optimization of integration processes
The efficient execution of integration processes between distributed, heterogeneous data sources and applications is a challenging research area of data management. These inn proc...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...
DSN
2008
IEEE
15 years 1 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ACL
2008
15 years 1 months ago
Combining Speech Retrieval Results with Generalized Additive Models
Rapid and inexpensive techniques for automatic transcription of speech have the potential to dramatically expand the types of content to which information retrieval techniques can...
J. Scott Olsson, Douglas W. Oard
BCSHCI
2007
15 years 1 months ago
Visualising Bluetooth interactions: combining the Arc diagram and DocuBurst techniques
Within the Bluetooth mobile space, overwhelmingly large sets of interaction and encounter data can very quickly be accumulated. This presents a challenge to gaining an understandi...
Daragh Byrne, Barry Lavelle, Gareth J. F. Jones, A...