Sciweavers

1575 search results - page 206 / 315
» The provenance of electronic data
Sort
View
ICB
2007
Springer
164views Biometrics» more  ICB 2007»
15 years 3 months ago
Hardening Fingerprint Fuzzy Vault Using Password
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure te...
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain
CLADE
2004
IEEE
15 years 3 months ago
A Collaborative Informatics Infrastructure for Multi-scale Science
The Collaboratory for Multi-scale Chemical Science (CMCS) is developing a powerful informaticsbased approach to synthesizing multi-scale information to support a systems-based res...
James D. Myers, Thomas C. Allison, Sandra Bittner,...
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 3 months ago
Genetic programming for human oral bioavailability of drugs
Automatically assessing the value of bioavailability from the chemical structure of a molecule is a very important issue in biomedicine and pharmacology. In this paper, we present...
Francesco Archetti, Stefano Lanzeni, Enza Messina,...
ASM
2008
ASM
15 years 1 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright
BPM
2008
Springer
192views Business» more  BPM 2008»
15 years 1 months ago
Trace Clustering in Process Mining
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Minseok Song, Christian W. Günther, Wil M. P....