Sciweavers

2648 search results - page 386 / 530
» Human Factors In Computer Security
Sort
View
SWS
2004
ACM
15 years 8 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
133
Voted
MM
2005
ACM
121views Multimedia» more  MM 2005»
15 years 8 months ago
Exploring media correlation and synchronization for navigated hypermedia documents
This paper is devoted to explore media correlation and media synchronization in a composite multimedia document, the so-called navigated hypermedia document in our language learni...
Kuo-Yu Liu, Herng-Yow Chen
MM
2004
ACM
154views Multimedia» more  MM 2004»
15 years 8 months ago
Bio-Fi: inverse biotelemetry projects
Bio-Fi is a collection of art projects undertaken by S.W.A.M.P. (Studies of Work Atmospheres and Mass Production), collaborative art projects by Douglas Easterly and Matt Kenyon. ...
Douglas Easterly
150
Voted
CVPR
2006
IEEE
16 years 5 months ago
Recognize High Resolution Faces: From Macrocosm to Microcosm
Human faces manifest distinct structures and characteristics when observed in different scales. Traditional face recognition techniques mainly rely on low-resolution face images, ...
Dahua Lin, Xiaoou Tang