Sciweavers

127 search results - page 12 / 26
» Gaps and future directions in mobile security research
Sort
View
KDD
2009
ACM
160views Data Mining» more  KDD 2009»
15 years 5 months ago
Surveying the complementary role of automatic data analysis and visualization in knowledge discovery
The aim of this work is to survey and reflect on the various ways to integrate visualization and data mining techniques toward a mixed-initiative knowledge discovery taking the be...
Enrico Bertini, Denis Lalanne
AGENTS
2001
Springer
15 years 3 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
PERCOM
2007
ACM
15 years 10 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
WSC
2001
15 years 7 days ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin
97
Voted
ACSAC
2005
IEEE
15 years 4 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen