Sciweavers

380 search results - page 35 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
ESORICS
2005
Springer
15 years 9 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
127
Voted
EURONGI
2006
Springer
15 years 7 months ago
Performance Analysis of Wireless Multihop Data Networks
We consider wireless multihop data networks with random multi-access mechanisms at the MAC layer. In general, our aim is to study the performance as perceived by users in a dynamic...
Nidhi Hegde, Alexandre Proutiére
ICCV
2003
IEEE
16 years 5 months ago
Fusion of Static and Dynamic Body Biometrics for Gait Recognition
Human identification at a distance has recently gained growing interest from computer vision researchers. This paper aims to propose a visual recognition algorithm based upon fusi...
Liang Wang, Huazhong Ning, Tieniu Tan, Weiming Hu
130
Voted
ASPLOS
2010
ACM
15 years 10 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
IMC
2004
ACM
15 years 9 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...