Sciweavers

5628 search results - page 49 / 1126
» Data challenges at Yahoo!
Sort
View
SOUPS
2009
ACM
15 years 11 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
INTERACT
2007
15 years 6 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
CSL
2010
Springer
15 years 5 months ago
Monaural speech separation and recognition challenge
Robust speech recognition in everyday conditions requires the solution to a number of challenging problems, not least the ability to handle multiple sound sources. The specific ca...
Martin Cooke, John R. Hershey, Steven J. Rennie
FGR
2011
IEEE
238views Biometrics» more  FGR 2011»
14 years 8 months ago
The first facial expression recognition and analysis challenge
— Automatic Facial Expression Recognition and Analysis, in particular FACS Action Unit (AU) detection and discrete emotion detection, has been an active topic in computer science...
Michel François Valstar, Bihan Jiang, Marc ...
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 11 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine