Sciweavers

2399 search results - page 112 / 480
» On Authentication between Human and Computer
Sort
View
135
Voted
SIGCSE
2008
ACM
102views Education» more  SIGCSE 2008»
15 years 3 months ago
Teaching tales: some student perceptions of computing education
: Student perceptions of the educational experiences that are provided to them at tertiary institutions do not necessarily match the perceptions of the academics who provide these ...
Carol Edmondson
138
Voted
WWW
2007
ACM
16 years 4 months ago
Computer-Supported Collaborative Knowledge Modeling in Ecology
We describe collaborative efforts between a knowledge representation team, a community of scientists, and scientific information managers in developing knowledge models for ecolog...
Deana Pennington, Joshua S. Madin, Ferdinando Vill...
GECCO
2005
Springer
138views Optimization» more  GECCO 2005»
15 years 9 months ago
Hierarchical multi-sensor image registration using evolutionary computation
Image registration between multi-sensor imagery is a challenging problem due to the difficulties associated with finding a correspondence between pixels from images taken by the...
Ju Han, Bir Bhanu
121
Voted
CCS
2009
ACM
15 years 10 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
128
Voted
ICNS
2009
IEEE
15 years 10 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...