Sciweavers

11665 search results - page 1855 / 2333
» Human computing for EDA
Sort
View
EUROCRYPT
2005
Springer
15 years 11 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
RAID
2005
Springer
15 years 11 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
155
Voted
JCDL
2004
ACM
170views Education» more  JCDL 2004»
15 years 10 months ago
Looking for new, not known music only: music retrieval by melody style
With the growth of digital music, content-based music retrieval (CBMR) has attracted increasingly attention. For most CBMR systems, the task is to return music objects similar to ...
Fang-Fei Kuo, Man-Kwan Shan
ICCHP
2004
Springer
15 years 10 months ago
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children
: Multimedia and Hypermedia technologies can be successfully used in education and rehabilitation for cognitively disabled persons. In particular, storytelling has always proved su...
Thimoty Barbieri, Antonio Bianchi, Licia Sbattella
ICCHP
2004
Springer
15 years 10 months ago
Exploring Scalable Vector Graphics for Visually Impaired Users
Graphical information is very important in common information publishing. For visually impaired users this information is usually not accessible. Scalable Vector Graphics, a recomm...
Martin Rotard, Kerstin Otte, Thomas Ertl
« Prev « First page 1855 / 2333 Last » Next »