Sciweavers

796 search results - page 138 / 160
» Problem Generation: Evaluation of Two Domains in Operating S...
Sort
View
SOUPS
2010
ACM
15 years 1 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
CCGRID
2008
IEEE
15 years 4 months ago
Modeling "Just-in-Time" Communication in Distributed Real-Time Multimedia Applications
—The research area of Multimedia Content Analysis (MMCA) considers all aspects of the automated extraction of new knowledge from large multimedia data streams and archives. In re...
R. Yang, Robert D. van der Mei, D. Roubos, Frank J...
COMPSAC
1998
IEEE
15 years 1 months ago
Allocating Data Objects to Multiple Sites for Fast Browsing of Hypermedia Documents
Many world wide web applications require access, transfer, and synchronization of large multimedia data objects (MDOs) (such as, audio, video, and images) across the communication...
Siu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem
65
Voted
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
15 years 2 months ago
Enterprise Wide Development - A Survey of Critical Factors for Co-Ordinated Development in Complex Organizations: What Developme
This paper describes critical factors for co-ordinated enterprise and IS/IT development and change in complex organizations in Sweden. These factors represent an answer on the cru...
Magnus Holmqvist, Håkan Enquist
CCS
2007
ACM
15 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu