Sciweavers

11589 search results - page 2124 / 2318
» Human computation
Sort
View
CCS
2008
ACM
15 years 6 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
CCS
2008
ACM
15 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
DIMEA
2008
223views Multimedia» more  DIMEA 2008»
15 years 5 months ago
Toward accessible 3D virtual environments for the blind and visually impaired
3D virtual environments are increasingly used for education, business and recreation but are often inaccessible to users who are visually impaired, effectively creating a digital ...
Gareth R. White, Geraldine Fitzpatrick, Graham McA...
ECAI
2008
Springer
15 years 5 months ago
Belief revision with reinforcement learning for interactive object recognition
From a conceptual point of view, belief revision and learning are quite similar. Both methods change the belief state of an intelligent agent by processing incoming information. Ho...
Thomas Leopold, Gabriele Kern-Isberner, Gabriele P...
EVOW
2008
Springer
15 years 5 months ago
Scaffolding for Interactively Evolving Novel Drum Tracks for Existing Songs
Abstract. A major challenge in computer-generated music is to produce music that sounds natural. This paper introduces NEAT Drummer, which takes steps toward natural creativity. NE...
Amy K. Hoover, Michael P. Rosario, Kenneth O. Stan...
« Prev « First page 2124 / 2318 Last » Next »