Search Results - "Kapczynski, A."
-
1
Building a Law-and-Political-Economy Framework: Beyond the Twentieth-Century Synthesis
Published in The Yale law journal (01-04-2020)“…We live in a time of interrelated crises. Economic inequality and precarity, and crises of democracy, climate change, and more raise significant challenges for…”
Get full text
Journal Article -
2
Same-Sex Privacy and the Limits of Antidiscrimination Law
Published in The Yale law journal (01-03-2003)“…Sex-based bona fide occupational qualification (BFOQ) are a key location where sexual difference is symbolized in the law. This note examines one sex-based…”
Get full text
Journal Article -
3
Queer Brinksmanship: Citizenship and the Solomon Wars
Published in The Yale law journal (01-12-2002)“…In 1994, Congress passed a law commonly known as the Solomon Amendment, threatening universities and law schools with loss of federal funding if they deny or…”
Get full text
Journal Article -
4
Global health and university patents
Published in Science (American Association for the Advancement of Science) (19-09-2003)“…Universities have long been important in the development of life-saving medicines and technologies, and they once considered patenting to be antithetical to…”
Get full text
Journal Article -
5
Fuzzy evaluation of biometric authentication systems
Published in Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (01-09-2011)“…This paper presents a new approach in evaluation of biometric identity verification system, which is based on three important indicators: false acceptance…”
Get full text
Conference Proceeding -
6
Biometric logical access control enhanced by use of steganography over secured transmission channel
Published in Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (01-09-2011)“…In the paper we present a novel approach to logical access control to secured repository or container by integration of methods related to cryptography,…”
Get full text
Conference Proceeding -
7
Fuzzy logic applied in databases for investors
Published in 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (01-09-2009)“…This article presents approach and experiment involving experts' knowledge in investment databases. Presented approach indicates a way of use of AI in…”
Get full text
Conference Proceeding -
8
Model of intelligent detection mechanism against false biometric data injection in fingerprint-based authentication systems
Published in 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (01-09-2009)“…In this article we propose the novel approach related to detection false biometric data which relies on analyses of templates instead of fingerprint images…”
Get full text
Conference Proceeding -
9
Application of quantum cryptography protocols in authentication process
Published in Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (01-09-2011)“…This article presents proposition of using quantum cryptography protocols in authentication process. Model is based on BB84 protocol. It is certain that…”
Get full text
Conference Proceeding -
10
Distributed Authentication Systems Enhanced by Quantum Protocols
Published in Fifth International Conference on Information Technology: New Generations (itng 2008) (01-04-2008)“…In the article problem of securing distributed biometric authentication system was discussed. After introduction to biometric domain, the key issues connected…”
Get full text
Conference Proceeding