Sciweavers

1653 search results - page 176 / 331
» Directed tree-width examples
Sort
View
ACSAC
2005
IEEE
15 years 7 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
ACSC
2005
IEEE
15 years 7 months ago
A Programming Language for Web Service Development
There is now widespread acceptance of Web services and service-oriented architectures. But despite the agreement on key Web services standards there remain many challenges. Progra...
Dominic Cooney, Marlon Dumas, Paul Roe
AIPR
2005
IEEE
15 years 7 months ago
Hyperspectral Detection Algorithms: Operational, Next Generation, on the Horizon
Abstract—The multi-band target detection algorithms implemented in hyperspectral imaging systems represent perhaps the most successful example of image fusion. A core suite of su...
A. Schaum
DSN
2005
IEEE
15 years 7 months ago
Lumping Matrix Diagram Representations of Markov Models
Continuous-time Markov chains (CTMCs) have been used successfully to model the dependability and performability of many systems. Matrix diagrams (MDs) are known to be a space-efï¬...
Salem Derisavi, Peter Kemper, William H. Sanders
ICIP
2005
IEEE
15 years 7 months ago
Image processing considerations for simple real-time restrictometric fluid-based user interfaces
The FUNtain (TM) is a new input device in which a user inputs data by direct interaction with fluid, such as with one or more air or water jets. There is usually a (re)strictomet...
Steve Mann