Sciweavers

2281 search results - page 402 / 457
» Security Patterns and Secure Systems Design
Sort
View
126
Voted
TKDE
2008
125views more  TKDE 2008»
15 years 3 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
156
Voted
PAMI
2012
13 years 6 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
WOTUG
2007
15 years 4 months ago
A Process Oriented Approach to USB Driver Development
Abstract. Operating-systems are the core software component of many modern computer systems, ranging from small specialised embedded systems through to large distributed operating-...
Carl G. Ritson, Fred R. M. Barnes
130
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Macintosh OS X: a smooth migration
The Ringling School of Art and Design is a fully accredited four year college of visual art and design with a student population of approximately 1000. The Ringling School has ach...
Scott E. Hanselman, Mahmoud Pegah
119
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Multi-dimensional service compositions
The wide diffusion of reliable Internet is pushing two key novelties in the conception of modern software applications: the Software as a Service paradigm and the idea of the Inte...
Luciano Baresi, Elisabetta Di Nitto, Sam Guinea, S...