Sciweavers

868 search results - page 127 / 174
» A new approach for factorizing FSM's
Sort
View
FPLAY
2008
14 years 11 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
DAGSTUHL
2007
14 years 11 months ago
Norms of Conversation in a Framework for Agent Communication Languages
Abstract. In open and heterogeneous environments offered by the Internet, where agents are designed by different vendors, the development of standards for agent communication nee...
Rodrigo Agerri
SDM
2008
SIAM
118views Data Mining» more  SDM 2008»
14 years 11 months ago
Massive-Scale Kernel Discriminant Analysis: Mining for Quasars
We describe a fast algorithm for kernel discriminant analysis, empirically demonstrating asymptotic speed-up over the previous best approach. We achieve this with a new pattern of...
Ryan Riegel, Alexander Gray, Gordon Richards
AAAI
2006
14 years 11 months ago
DNNF-based Belief State Estimation
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
Paul Elliott, Brian C. Williams
INTERACT
2003
14 years 11 months ago
Does an Individual's Myers-Briggs Type Indicator Preference Influence Task-Oriented Technology Use?
: Technology innovators face the challenge of finding representative groups of users to participate in design activities. In some cases, software applications will target an audien...
Pamela J. Ludford, Loren G. Terveen