Sciweavers

3007 search results - page 411 / 602
» Designing for collective remembering
Sort
View
ITCC
2005
IEEE
15 years 11 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
IWPC
2005
IEEE
15 years 11 months ago
Supporting the Evolution of a Software Visualization Tool Through Usability Studies
The paper presents a usability study conducted with graduate and undergraduate computer science students, designed to evaluate the effectiveness of a software visualization tool n...
Andrian Marcus, Denise Comorski, Andrey Sergeyev
SAINT
2005
IEEE
15 years 11 months ago
HAR: Hierarchy-Based Anycast Routing Protocol for Wireless Sensor Networks
In this paper, we present Hierarchy-Based Anycast Routing (HAR), a routing protocol for collecting data over multi-hop, wireless sensor networks. The design of the protocol aims t...
Niwat Thepvilojanapong, Yoshito Tobe, Kaoru Sezaki
WACV
2005
IEEE
15 years 11 months ago
Measures of Similarity
Quantitative evaluation and comparison of image segmentation algorithms is now feasible owing to the recent availability of collections of hand-labeled images. However, little att...
Ranjith Unnikrishnan, Martial Hebert
WECWIS
2005
IEEE
94views ECommerce» more  WECWIS 2005»
15 years 11 months ago
Electronic Trading in Order-Driven Markets: Efficient Execution
In this paper, we address the importance of efficient execution in electronic markets. Due to intense competition for profit opportunities, trading costs can represent a significa...
Yuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou...