Sciweavers

1972 search results - page 359 / 395
» Hidden semi-Markov models
Sort
View
IDEAL
2010
Springer
14 years 7 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
PROVSEC
2010
Springer
14 years 7 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
UIST
2010
ACM
14 years 7 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
USS
2010
14 years 7 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
WD
2010
14 years 7 months ago
Beamforming for heterogeneously equipped nodes in wireless ad hoc networks
It has long been known that adaptive beamforming has the potential to enhance the performance of wireless ad hoc networks significantly. However, due to the decentralized nature of...
Ulrike Korger, Manuel Wocheslander, Christian Hart...