Sciweavers

451 search results - page 38 / 91
» Constrained Sums of Information Systems
Sort
View
ITCC
2005
IEEE
15 years 7 months ago
The N/R One Time Password System
A new one time password system is described which is secure against eavesdropping and server database compromise at the same time. Traditionally, these properties have proven to b...
Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yo...
CCS
2006
ACM
15 years 5 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
JNCA
2006
114views more  JNCA 2006»
15 years 1 months ago
An evolutionary approach to prototyping pedagogical agents: from simulation to integrated system
We have developed and integrated software agents with two educational groupware systems (TeamWave Workplace and FLE), using evolutionary prototyping and empiricalbased design as d...
Anders I. Mørch, Jan A. Dolonen, Jan Eirik ...
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 5 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen
MM
2010
ACM
137views Multimedia» more  MM 2010»
15 years 2 months ago
Unsupervised summarization of rushes videos
This paper proposes a new framework to formulate the problem of rushes video summarization as an unsupervised learning problem. We pose the problem of video summarization as one o...
Yang Liu, Feng Zhou, Wei Liu, Fernando De la Torre...