Sciweavers

500 search results - page 45 / 100
» On the Hardness of Being Truthful
Sort
View
WISA
2004
Springer
15 years 5 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
ICDAR
2003
IEEE
15 years 5 months ago
Using Character Recognition and Segmentation to Tell Computer from Humans
How do you tell a computer from a human? The situation arises often on the Internet, when online polls are conducted, accounts are requested, undesired email is received, and chat...
Patrice Y. Simard, Richard Szeliski, Josh Benaloh,...
NDSS
2003
IEEE
15 years 5 months ago
Integrating Security, Mobility and Multi-Homing in a HIP Way
The current trend in mobile networking is towards mobile hosts that have multiple network interfaces, e.g., WLAN and GPRS. However, when the current Internet architecture was orig...
Pekka Nikander, Jukka Ylitalo, Jorma Wall
RTCSA
2003
IEEE
15 years 5 months ago
Deterministic and Statistical Deadline Guarantees for a Mixed Set of Periodic and Aperiodic Tasks
Current hard real-time technologies are unable to support a new class of applications that have real-time constraints but with dynamic request arrivals and unpredictable resource r...
Minsoo Ryu, Seongsoo Hong
VR
2003
IEEE
141views Virtual Reality» more  VR 2003»
15 years 5 months ago
Device Independence and Extensibility in Gesture Recognition
Gesture recognition techniques often suffer from being highly device-dependent and hard to extend. If a system is trained using data from a specific glove input device, that syst...
Jacob Eisenstein, Shahram Ghandeharizadeh, Leana G...