Sciweavers

6147 search results - page 30 / 1230
» Requirements, Architectures and Risks
Sort
View
ICASSP
2008
IEEE
15 years 6 months ago
The probability of near midair collisions using level-crossings
We consider probabilistic methods to compute the near midair collision risk using state estimate and covariance from a target tracking filter based on angle-only sensors such as ...
Per-Johan Nordlund, Fredrik Gustafsson
JSW
2008
99views more  JSW 2008»
14 years 11 months ago
Using Data Mining in MURA Graphic Problems
The MURA phenomenon will result lots of problems in Photomask and TFT-LCD industries as well. In this paper, we designed and developed a MURA related association rules which suitab...
Wen-Hsing Kao, Jason C. Hung, Victoria Hsu
SOUPS
2009
ACM
15 years 6 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 6 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
IFIP
2003
Springer
15 years 5 months ago
TAPI: Transactions for Accessing Public Infrastructure
This paper describes TAPI, an offline scheme intended for general Internet-based micropayments. TAPI, which extends and combines concepts from the KeyNote Microchecks and OTPCoins...
Matt Blaze, John Ioannidis, Sotiris Ioannidis, Ang...