Sciweavers

14783 search results - page 2612 / 2957
» Quantum Information Processing
Sort
View
PR
2010
220views more  PR 2010»
15 years 3 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
PVLDB
2010
117views more  PVLDB 2010»
15 years 3 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
RAS
2010
164views more  RAS 2010»
15 years 3 months ago
Towards performing everyday manipulation activities
This article investigates fundamental issues in scaling autonomous personal robots towards open-ended sets of everyday manipulation tasks which involve high complexity and vague j...
Michael Beetz, Dominik Jain, Lorenz Mösenlech...
SEE
2010
Springer
15 years 3 months ago
The Social Nature of Engineering and its Implications for Risk Taking
Making decisions with an, often significant, element of risk seems to be an integral part of many of the projects of the diverse profession of engineering. Whether it be decisions...
Allison Ross, Nafsika Athanassoulis
SIGCSE
2010
ACM
395views Education» more  SIGCSE 2010»
15 years 3 months ago
Linux kernel projects for an undergraduate operating systems course
In this paper, we present a series of programming projects based on the Linux kernel for students in a senior-level undergraduate operating systems course. The projects we describ...
Rob Hess, Paul Paulson
« Prev « First page 2612 / 2957 Last » Next »