Sciweavers

8655 search results - page 1178 / 1731
» Challenges for Trusted Computing
Sort
View
JCP
2006
120views more  JCP 2006»
15 years 5 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
126
Voted
JUCS
2008
137views more  JUCS 2008»
15 years 5 months ago
CrossMDA: a Model-driven Approach for Aspect Management
: Nowadays, the complexity of software applications has brought new challenges to developers, having to deal with a large number of computational requirements. Among these requirem...
Marcelo Pitanga Alves, Paulo F. Pires, Fláv...
KI
2008
Springer
15 years 5 months ago
Enhancing Animated Agents in an Instrumented Poker Game
In this paper we present an interactive poker game in which one human user plays against two animated agents using RFID-tagged poker cards. The game is used as a showcase to illust...
Marc Schröder, Patrick Gebhard, Marcela Charf...
160
Voted
JMLR
2006
105views more  JMLR 2006»
15 years 5 months ago
Parallel Software for Training Large Scale Support Vector Machines on Multiprocessor Systems
Parallel software for solving the quadratic program arising in training support vector machines for classification problems is introduced. The software implements an iterative dec...
Luca Zanni, Thomas Serafini, Gaetano Zanghirati
JMM2
2006
146views more  JMM2 2006»
15 years 5 months ago
Multifont Arabic Characters Recognition Using HoughTransform and HMM/ANN Classification
Optical Characters Recognition (OCR) has been an active subject of research since the early days of computers. Despite the age of the subject, it remains one of the most challengin...
Nadia Ben Amor, Najoua Essoukri Ben Amara
« Prev « First page 1178 / 1731 Last » Next »