Sciweavers

7405 search results - page 1054 / 1481
» Computer Graphics
Sort
View

Publication
545views
16 years 21 days ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....

Publication
404views
16 years 21 days ago
Bayesian variable order Markov models.
We present a simple, effective generalisation of variable order Markov models to full online Bayesian estimation. The mechanism used is close to that employed in context tree wei...
Christos Dimitrakakis
ICMLA
2009
16 years 21 days ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
ICCD
2004
IEEE
149views Hardware» more  ICCD 2004»
16 years 19 days ago
Adaptive Selection of an Index in a Texture Cache
For a specified application, there is an opportunity to improve cache performance by smart choosing of index bits of a cache. A texture cache for texture mapping of 3D computer gr...
Chun-Ho Kim, Lee-Sup Kim
AGS
2009
Springer
15 years 10 months ago
Intelligent NPCs for Educational Role Play Game
Video games in general and educational role play games in particular would increase in believability if Non Player Characters reacted appropriately to the player’s actions. Reali...
Mei Yii Lim, João Dias, Ruth Aylett, Ana Pa...
« Prev « First page 1054 / 1481 Last » Next »