Sciweavers

9186 search results - page 1470 / 1838
» A Module System for Scheme
Sort
View
127
Voted
ICIP
2005
IEEE
16 years 5 months ago
A spatial image hierarchy for compression in image-based-rendering
Image-based rendering (IBR) systems create photorealistic views of complex 3D environments by resampling large collections of images captured in the environment. The quality of th...
Daniel G. Aliaga, Ingrid Carlbom
222
Voted
ICDE
2007
IEEE
136views Database» more  ICDE 2007»
16 years 5 months ago
Faceted Browsing over Large Databases of Text-Annotated Objects
We demonstrate a fully working system for multifaceted browsing over large collections of text-annotated data, such as annotated images, that are stored in relational databases. T...
Wisam Dakka, Panagiotis G. Ipeirotis, Kenneth R. W...
154
Voted
DAC
2007
ACM
16 years 4 months ago
Program Mapping onto Network Processors by Recursive Bipartitioning and Refining
Mapping packet processing applications onto embedded network processors (NP) is a challenging task due to the unique constraints of NP systems and the characteristics of network a...
Jia Yu, Jingnan Yao, Jun Yang 0002, Laxmi N. Bhuya...
133
Voted
CHI
2008
ACM
16 years 4 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
112
Voted
CHI
2008
ACM
16 years 4 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
« Prev « First page 1470 / 1838 Last » Next »