Sciweavers

11665 search results - page 191 / 2333
» Human computing for EDA
Sort
View
126
Voted
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 10 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
131
Voted
ETRICS
2006
15 years 8 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
ICPR
2004
IEEE
16 years 6 months ago
Exploring Human Eye Behaviour using a Model of Visual Attention
It is natural in a visual search to look at any object that is similar to the target so that it can be recognised and a decision made to end the search. Eye tracking technology of...
Fred Stentiford, Oyewole Oyekoya
121
Voted
SEMCO
2007
IEEE
15 years 11 months ago
Reliability of human annotation of semantic roles in noisy text
This paper addresses the question of how to obtain consistent semantic annotation on the basis of a set of noisy texts. Many potential realworld applications of semantic computing...
Derrick Higgins
116
Voted
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 8 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob