University of Cambridge Computer Laboratory

Results: 746



#Item
541Security / Quality management / IRIS / National Institute of Standards and Technology / National security / Biometrics / Iris recognition / University of Cambridge Computer Laboratory

PDF Document

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2009-12-24 12:01:35
542CPL / University of Cambridge Computer Laboratory / Computing

Department of Natural Resources Wildlife Resources Division Law Enforcement Section Field Operations Weekly Report

Add to Reading List

Source URL: gadnrle.org

Language: English - Date: 2014-08-04 12:19:51
543Software testing / Hacking / Vulnerability / Responsible disclosure / Full disclosure / Computer network security / Bugtraq / Social vulnerability / Patch / Computer security / Cyberwarfare / Risk

The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting Andy Ozment∗ Computer Security Group Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/users/jo262/

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32
544University of Cambridge Computer Laboratory / Computing / On-board diagnostics / Holism / Source code / Subroutine

MaxiSYS_Subaru_V1.50 Fuction List(Note:For reference only) NOTES: ● This function is supported. ※ This function may be supported, which depends on the actual condition of the vehicle. ○ This function is not sup

Add to Reading List

Source URL: www.autelscanner.com

Language: English - Date: 2014-07-04 18:15:04
545Anatomy / Biometrics / Iris recognition / University of Cambridge Computer Laboratory / Face recognition / Iris / Iridology / John Daugman / Facial recognition system / Optics / Vision / Eye

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY[removed]How Iris Recognition Works John Daugman

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2008-11-20 11:54:22
546Information theory / Randomness / Multivariate normal distribution / Normal distribution / Entropy / Principal component analysis / Linear discriminant analysis / Multivariate random variable / Eigenvalues and eigenvectors / Statistics / Multivariate statistics / Singular value decomposition

Template Attacks on Different Devices Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge, Cambridge, UK {omar.choudary,markus.kuhn}@cl.cam.ac.uk Abstract. Template attacks remain a most powerf

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-09-23 11:16:45
547University of Cambridge Computer Laboratory / Xen / Scheduling / Hypervisor / Office of the Secretary of Defense / Ring / Small Business Innovation Research / System software / Software / Scheduling algorithms

2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP MiCART™: Mixed Criticality Real-time Hypervisor

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-08-05 14:06:06
548University of Cambridge Computer Laboratory / Computing / Holism / Source code / Subroutine

Record Retention Values The following four values were used to evaluate and determine how long a record needs to be retained. After assessing the corresponding values for a record, the greatest value will determine the

Add to Reading List

Source URL: www.sdbor.edu

Language: English - Date: 2012-01-24 12:54:24
549Natural language processing / Information retrieval / Linguistics / Relevance / Speech recognition / DARPA / Named-entity recognition / Text Retrieval Conference / Computational linguistics / Science / Information science

Automatic language and information processing: rethinking evaluation ∗ Karen Sparck Jones Computer Laboratory, University of Cambridge New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK [removed]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-01-08 06:55:10
550Information theory / Randomness / Multivariate normal distribution / Normal distribution / Entropy / Principal component analysis / Linear discriminant analysis / Multivariate random variable / Eigenvalues and eigenvectors / Statistics / Multivariate statistics / Singular value decomposition

Template Attacks on Different Devices Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge, Cambridge, UK {omar.choudary,markus.kuhn}@cl.cam.ac.uk Abstract. Template attacks remain a most powerf

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-09-23 11:16:45
UPDATE