Sciweavers

480 search results - page 56 / 96
» Portrait: Generating Personal Presentations
Sort
View
CSREASAM
2010
14 years 7 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
HUC
2004
Springer
15 years 3 months ago
Reminding About Tagged Objects Using Passive RFIDs
People often misplace objects they care about. We present a system that generates reminders about objects left behind by tagging those objects with passive RFID tags. Readers posit...
Gaetano Borriello, Waylon Brunette, Matthew Hall, ...
ICPR
2002
IEEE
15 years 2 months ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
DMIN
2006
131views Data Mining» more  DMIN 2006»
14 years 11 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
GIS
2009
ACM
15 years 10 months ago
Augmenting Cartographic Resources for Autonomous Driving
In this paper we present algorithms for automatically generating a road network description from aerial imagery. The road network inforamtion (RNI) produced by our algorithm inclu...
Young-Woo Seo, Chris Urmson, David Wettergreen Ji...