Sciweavers

634 search results - page 92 / 127
» Groundwork for Weak Analysis
Sort
View
115
Voted
ICNP
2007
IEEE
15 years 8 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
CCS
2007
ACM
15 years 8 months ago
Do background images improve "draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...
Paul Dunphy, Jeff Yan
115
Voted
CDVE
2007
Springer
137views Visualization» more  CDVE 2007»
15 years 8 months ago
A Virtual Interactive Community Platform Supporting Education for Long-Term Sick Children
Analysis of existing ICT-based solutions for the education of long-term ill children reveal several weaknesses with respect to social and cooperative involvement, cost of developme...
Pieter Jorissen, Fabian Di Fiore, Gert Vansichem, ...
72
Voted
CEAS
2007
Springer
15 years 8 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
SEMWEB
2007
Springer
15 years 8 months ago
OntoDNA: Ontology Alignment Results for OAEI 2007
OntoDNA is an automated ontology mapping and merging system that utilizes unsupervised data mining methods, comprising of Formal Concept analysis (FCA), Self-Organizing map (SOM) a...
Ching-Chieh Kiu, Chien-Sing Lee