Sciweavers

3007 search results - page 411 / 602
» Designing for collective remembering
Sort
View
ITCC
2005
IEEE
15 years 7 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
IWPC
2005
IEEE
15 years 7 months ago
Supporting the Evolution of a Software Visualization Tool Through Usability Studies
The paper presents a usability study conducted with graduate and undergraduate computer science students, designed to evaluate the effectiveness of a software visualization tool n...
Andrian Marcus, Denise Comorski, Andrey Sergeyev
SAINT
2005
IEEE
15 years 7 months ago
HAR: Hierarchy-Based Anycast Routing Protocol for Wireless Sensor Networks
In this paper, we present Hierarchy-Based Anycast Routing (HAR), a routing protocol for collecting data over multi-hop, wireless sensor networks. The design of the protocol aims t...
Niwat Thepvilojanapong, Yoshito Tobe, Kaoru Sezaki
WACV
2005
IEEE
15 years 7 months ago
Measures of Similarity
Quantitative evaluation and comparison of image segmentation algorithms is now feasible owing to the recent availability of collections of hand-labeled images. However, little att...
Ranjith Unnikrishnan, Martial Hebert
WECWIS
2005
IEEE
94views ECommerce» more  WECWIS 2005»
15 years 7 months ago
Electronic Trading in Order-Driven Markets: Efficient Execution
In this paper, we address the importance of efficient execution in electronic markets. Due to intense competition for profit opportunities, trading costs can represent a significa...
Yuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou...