38,131 Hits in 4.9 sec

SNoW: Understanding the causes of strong, neutral, and weak face impostor pairs

Amanda Sgroi, Kevin W. Bowyer, Patrick Flynn, P. Jonathon Phillips
2013 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)  
We develop three partitions within the impostor distribution for a given algorithm. The Strong partition contains image pairs that are easy to categorize as impostors.  ...  Three algorithms, and the fusion of their scores, were used to analyze the performance of these three partitions using the same set of authentic scores employed in the Face Recognition Vendor Test (FRVT  ...  The Weak partition contains pairs of face image of different people which may be considered to be an authentic pair; these are often the im-age pairs which cause false matches in a recognition system.  ... 
doi:10.1109/btas.2013.6712697 dblp:conf/btas/SgroiBFP13 fatcat:fzjx4hmkbfee3melaobdyipdoe

Systematic Error Analysis for the Enhancement of Biometric Systems Using Soft Biometrics

Anastasios Drosou, D. Tzovaras, K. Moustakas, M. Petrou
2012 IEEE Signal Processing Letters  
This letter presents a novel probabilistic framework for augmenting the recognition performance of biometric systems with information from continuous soft biometric (SB) traits.  ...  Experimental validation on two known, large datasets illustrates significant advances in the recognition performance with respect to both identification and authentication rates.  ...  INTRODUCTION I T is a common place that security in computer systems is an increasingly critical issue that affects a series of diverse applications, ranging from granting access control in restricted  ... 
doi:10.1109/lsp.2012.2221701 fatcat:uycqbv6mibdzpj6xcsbkq7pgma

Secretion of 17 alpha-hydroxy-5-pregnenolone by the canine adrenal gland during stimulation with adrenocorticotropin

1959 Journal of Biological Chemistry  
The partition coefficients for some authentic steroids were determined by solvent partitioning in the same systems as those employed for countercurrent distribution of the plasma extracts (Tables III  ...  those of authentic 17a-hydroxy-As-pregnenolone and 17oc-hydroxyprogesterone, obtained by partitioning in the same systems.  ...  distribution in two systems, paper chromatography in one system, the results of the sulfuric acid-ethanol reaction, specific for a As-3&hydroxyl configuration, and the vanillinphosphoric acid reaction,  ... 
pmid:13808005 fatcat:nxf4id32lveonh62pmvx3xlnli

Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics

C. Maple, V. Schetinin
2006 First International Conference on Availability, Reliability and Security (ARES'06)  
These multimodal biometric systems can give rise to large, distributed data sets that are used to decide the authenticity of a user.  ...  In this paper we discuss how DT models within the BMA methodology can be used for authentication in multimodal biometric systems.  ...  However, prior (1) is dependent not only on the level of partition but also on the distribution of data points in the partitions.  ... 
doi:10.1109/ares.2006.141 dblp:conf/IEEEares/MapleS06 fatcat:tqmgxy2v2fezdd6wheoyzfbzde

Distributed kNN Query Authentication

Ce Zhang, Cheng Xu, Jianliang Xu, Byron Choi
2018 2018 19th IEEE International Conference on Mobile Data Management (MDM)  
We design a new distributed spatial authenticated data structure (ADS), distributed MR-tree, to facilitate efficient kNN processing.  ...  In this paper, we investigate the query authentication problem in distributed environments and focus on the k nearest neighbor (kNN) query, which is widely used in spatial data analytics.  ...  In the future, we plan to design a distributed spatial query authentication system to support more spatial queries and efficient data updates.  ... 
doi:10.1109/mdm.2018.00034 dblp:conf/mdm/0004XC18 fatcat:nj3hnvmc45a33mqeh7mb6kdxde

Software Defined Edge Computing for Distributed Management and Scalable Control in IoT Multinetworks [article]

Di Wu, Xiang Nie, Hanhui Deng, Zhijin Qin
2021 arXiv   pre-print
Recently, edge computing has emerged as a promising paradigm to support mobile access in IoT multinetworks.  ...  To maintain its computing continuum, Software-Defined Networking (SDN) architecture can be applied to the distributed edge networks, which provides consistent frameworks for mobility management and creates  ...  Figure 3 . 3 A heterogeneous network space based partition. Figure 4 . 4 Authentication within access-granted network area: (a) access-granted areas, and (b) authentication procedure.  ... 
arXiv:2104.02426v1 fatcat:b7raim3knzb4vb3qrghkfkgtue

A Recommendation System for Dynamic Replication and Securing Data Process

Veeramalai Sankaradass, G. Nalinipriya
2015 Indian Journal of Science and Technology  
The replicated data are authenticated and send dynamically in the distributed system.  ...  The newly developed algorithms provide maximum performances in data sharing through distributed system and in achieving maximum security.  ...  When a particular user in the distributed system wants to send the data, he enters into the Network manager. With the help of network manager the authentication is provided for the data.  ... 
doi:10.17485/ijst/2015/v8i29/79163 fatcat:wq23v5fkbbbabdmdk73mpwhhqq

A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks

Natalia Castro Fernandes, Marc Moreira, Otto Carlos Muniz Bandeira Duarte
2010 2010 Proceedings IEEE INFOCOM  
This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity.  ...  The performance improvement arises mostly from the controller sets autonomy to recover after network partitions.  ...  Related research concerning authentication are reviewed in Section II, while system model assumptions are presented in Section III.  ... 
doi:10.1109/infcom.2010.5462232 dblp:conf/infocom/FernandesMD10 fatcat:k4v456onuzduzo6uhuahqdgqpm

A Blockchain-Based Privacy Protection Application for Logistics Big Data

Huabin Duan, Jie Yang, Huanjun Yang
2022 Journal of Cases on Information Technology  
In order to solve the problem of privacy protection in logistics big data system, a new kind of logistics user privacy data protection scheme is proposed.  ...  Logistics business is generally managed by logistics orders in plain text, and there is a risk of disclosure of customer privacy information in every business link.  ...  The user then needs to prove to the Verifier that he or she is a legitimate member of the group and remains anonymous to the Verifer during the authentication process.  ... 
doi:10.4018/jcit.295249 fatcat:2zsjplq4yra7pjj55egkzu3kgq

AAA: a survey and a policy-based architecture and framework

C. Rensing, M. Karsten, B. Stiller
2002 IEEE Network  
distributed system.  ...  The first major application of policies was access control in distributed systems, often termed role-based access control. A I Figure 2 . AAA architecture and interfaces [2] .  ... 
doi:10.1109/mnet.2002.1081762 fatcat:ufehyyfmmnau7m62nrx4s5pyyu

T2S2G: A Novel Two-Tier Secure Smart Grid Architecture to Protect Network Measurements

Israa T. Aziz, Hai Jin, Ihsan H. Abdulqadder, Sabah M. Alturfi, Wisam H. Alobaidi, Firas M.F. Flaih
2019 Energies  
Upon collected measurements, aggregator estimates state using the amended particle swarm optimization (APSO) algorithm in a distributed manner.  ...  To verify authenticity of aggregators, each aggregator is authenticated by a logical schedule based authentication (LSA) scheme at the control server (CS).  ...  System partitioning is performed to enable distributed SE in the system. The network partitioning by the WQT method is shown in Figure 3 .  ... 
doi:10.3390/en12132555 fatcat:mt2fhahhlrhmlf2z5ib4u7uzje

Crypto System based Authentication using CSTA in Grid

R. KalaiSelvi, V. Kavitha
2012 International Journal of Computer Applications  
Grid computing, as a distributed computing model, stands for the new kind of systems that pools heterogeneous computational resources, such as computers, storage space, sensors, application software, and  ...  In recent periods, many password-based user authentication schemes are proposed for solving the authentication issue.  ...  Kerberos is an authentication service designed for use in a distributed environment.  ... 
doi:10.5120/7515-0593 fatcat:zrjh7fnfqjdw7a6ji7wwbz6vda


V. Suganya
2018 International Journal of Advanced Research in Computer Science  
Computation offloading makes use of partitioning to segregate the compute intensive logic into different partitions, so that it can be executed in a distributed environment.  ...  Eventually, based on the partitioning results, the application components are executed in distributed manner.  ... 
doi:10.26483/ijarcs.v9i2.5767 fatcat:cn7s5h3i3vatbbjfq2z7gnuqky

Reversible Conjugation of Gibberellins In Situ in Maize

S. B. Rood, R. P. Pharis, M. Koshioka
1983 Plant Physiology  
' (i.e. apparent conjuption during seed maturation followed by release of the GA moiety during germination), was reproducible for pHIGA23 in seed from two maize hybrids produced over 2 years.  ...  Most of the radioactivity in the dry seeds was associated with compounds having partition characteristics of, and co-chromatographing on, sequential SiO2 partition and reverse-phase HPLC with glucosyl  ...  Following the [3H]GA4 feed, about 30% of the radioactivity in dry seeds partitioned into EtOAc at pH 3.0, and behaved chromatographically on SiO2 partition and reverse-phase C18 HPLC systems in a manner  ... 
doi:10.1104/pp.73.2.340 pmid:16663218 pmcid:PMC1066463 fatcat:5xbrbssoijg65addkeykkkxjke

Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices

Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Nikil Dutt, Rajesh Gupta
2004 Proceedings of the 41st annual conference on Design automation - DAC '04  
We present an approach in which we partition the watermarking embedding and extraction algorithms and migrate some tasks to a proxy server.  ...  Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data.  ...  ACKNOWLEDGEMENTS This work is supported in part by NSF Grant ACI-0204028. We would like thank R. Cornea, Paolo D'Alberto for reviewing the paper.  ... 
doi:10.1145/996566.996720 dblp:conf/dac/KejariwalGNDG04 fatcat:en7ttgrsfffnpbvy2yqtc6czli
« Previous Showing results 1 — 15 out of 38,131 results