Sciweavers

442 search results - page 41 / 89
» Exploration in computer games - a new starting point
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 10 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
NSPW
2004
ACM
15 years 5 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
ECSCW
2007
15 years 1 months ago
Dressing up for School Work? Supporting a Collaborative Environment with Heterogeneous Technologies
This paper approaches heterogeneity and heterogeneous technology as assets, rather than limitations, in the development of computer supported cooperative work. We demonstrate how h...
Christina Brodersen, Ole Sejer Iversen
CVPR
1997
IEEE
16 years 1 months ago
Recursive Structure and Motion from Image Sequences using Shape and Depth Spaces
In this paper a novel recursive method for estimating structure and motion from image sequences is presented. The novelty lies in the fact that the output of the algorithm is inde...
Rikard Berthilsson, Anders Heyden, Gunnar Sparr
ICALT
2006
IEEE
15 years 6 months ago
Content-Based Positioning in Learning Networks
Positioning in learning networks is a process that assists learners in finding a starting point and an efficient route in the network that will foster competence building. In orde...
Jan van Bruggen, Ellen Rusman, Bas Giesbers, Rob K...