Sciweavers

7596 search results - page 73 / 1520
» Challenges in forensic computing
Sort
View
SIGUCCS
2000
ACM
15 years 2 months ago
Implementing Assistive Technology: Opportunities and Challenges
In this paper, I describe some of the challenges and opportunities presented when attempting to be proactive in improving the accessibility of the University of North Carolina at ...
Janice K. Tulloss
ICPR
2006
IEEE
15 years 11 months ago
CAPTCHA Challenge Tradeoffs: Familiarity of Strings versus Degradation of Images
It is a well documented fact that, for human readers, familiar text is more legible than unfamiliar text. Current-generation computer vision systems also are able to exploit some ...
Jon Louis Bentley, Sui-Yu Wang
NSPW
2006
ACM
15 years 3 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
DEBS
2009
ACM
15 years 1 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...