Sciweavers

36320 search results - page 7123 / 7264
» From Code to Models
Sort
View
137
Voted
CCS
2009
ACM
15 years 8 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
122
Voted
DESRIST
2009
Springer
109views Education» more  DESRIST 2009»
15 years 8 months ago
The constitutive and the instrumental in social design
Simon’s The Sciences of the Artificial is rightly influential as a founding text in design research in the information systems field (IS). Simon’s contributions in the same vo...
Murali Venkatesh
EDBT
2009
ACM
277views Database» more  EDBT 2009»
15 years 8 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
192
Voted
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
15 years 8 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
137
Voted
IBPRIA
2009
Springer
15 years 8 months ago
Large Scale Online Learning of Image Similarity through Ranking
ent abstract presents OASIS, an Online Algorithm for Scalable Image Similarity learning that learns a bilinear similarity measure over sparse representations. OASIS is an online du...
Gal Chechik, Varun Sharma, Uri Shalit, Samy Bengio
« Prev « First page 7123 / 7264 Last » Next »