Sciweavers

1282 search results - page 208 / 257
» Signing on signing off
Sort
View
IASTEDSEA
2004
15 years 1 months ago
Deriving change architectures from RCS history
As software systems evolve over a series of releases, it becomes important to know which components show repeated need for maintenance. Deterioration of a single component manifes...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
ICVGIP
2004
15 years 1 months ago
Fingerprint Classification Using Orientation Field Flow Curves
Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. We propose an automatic approach of ...
Sarat C. Dass, Anil K. Jain
ISCAPDCS
2004
15 years 1 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
ISSA
2004
15 years 1 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ICISC
2001
162views Cryptology» more  ICISC 2001»
15 years 1 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng