Sciweavers

1179 search results - page 232 / 236
» Relative Timing Based Verification of Timed Circuits and Sys...
Sort
View
MM
2005
ACM
121views Multimedia» more  MM 2005»
15 years 3 months ago
Exploring media correlation and synchronization for navigated hypermedia documents
This paper is devoted to explore media correlation and media synchronization in a composite multimedia document, the so-called navigated hypermedia document in our language learni...
Kuo-Yu Liu, Herng-Yow Chen
ATAL
2005
Springer
15 years 3 months ago
Extending the recognition-primed decision model to support human-agent collaboration
There has been much research investigating team cognition, naturalistic decision making, and collaborative technology as it relates to real world, complex domains of practice. How...
Xiaocong Fan, Shuang Sun, Michael D. McNeese, John...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 3 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
CCS
2004
ACM
15 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
PET
2004
Springer
15 years 2 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...